Analysis
-
max time kernel
24s -
max time network
29s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win11-20240802-en
General
-
Target
Launcher.bat
-
Size
1KB
-
MD5
657a0896af0d783b71acee3e3ac09ab3
-
SHA1
00346d1e96589652460cbcae7897cce245caa852
-
SHA256
c6e3c6dd72ee9a69ea53f0eea8285168bab3b534462a43bf41c0e6f4913512d4
-
SHA512
65f691628c1e0a22cdb30c49f7c641d5915e9236fb43ebe670c9bba4be296c8bd7c0b1a6b5a5537357cf9effb92533ff87e44bc8003a186bfb4a166a63a13263
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 252 schtasks.exe 688 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1776 wrote to memory of 920 1776 cmd.exe 78 PID 1776 wrote to memory of 920 1776 cmd.exe 78 PID 1776 wrote to memory of 920 1776 cmd.exe 78 PID 920 wrote to memory of 688 920 compiler.exe 81 PID 920 wrote to memory of 688 920 compiler.exe 81 PID 920 wrote to memory of 688 920 compiler.exe 81 PID 920 wrote to memory of 252 920 compiler.exe 82 PID 920 wrote to memory of 252 920 compiler.exe 82 PID 920 wrote to memory of 252 920 compiler.exe 82 PID 1660 wrote to memory of 3308 1660 cmd.exe 89 PID 1660 wrote to memory of 3308 1660 cmd.exe 89 PID 1660 wrote to memory of 3308 1660 cmd.exe 89 PID 1512 wrote to memory of 4300 1512 cmd.exe 92 PID 1512 wrote to memory of 4300 1512 cmd.exe 92 PID 1512 wrote to memory of 4300 1512 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 14:39 /f /tn GameOptimizerTask_ODA1 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA1.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 14:39 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:252
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Launcher.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Launcher.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\compiler.exe"C:\Users\Admin\AppData\Local\Temp\compiler.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4780
-
C:\Users\Admin\AppData\Local\Temp\compiler.exe"C:\Users\Admin\AppData\Local\Temp\compiler.exe"1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD5720338739456ba40d9dfaa7c7c9d2ba2
SHA1e90307b776cbcea39fc8e8fb1491a2132642e7ef
SHA25687a6f12aa9885227d268a98a1e14f065a35a5945cee1ca35df703e70cdf74420
SHA512d7378afba36af6e3cf72b67bca965dc628969de52cbf01be7f4f731b5c795c246ab69c7a9311b4ad3b7a3552694ed1b82681bba78dc12a4fd34a3b1675e6aea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD56ee28e8d9a66956b524e14c33a125e5b
SHA17cafee2661e1c145aec3ea6957e7bb34f983cc97
SHA256fe49b267b80ef8036d5cff2841454059979886f443742a83ee79830d1288634b
SHA512f66bbbada298c4c5e34f4f7fd31af13c4d4fe8d6579b8e0b486f7c2687ba7a18f6673e72eaefcec805976647a4b5c6347004d5ec741fa8c4d3b9c173634e4af7
-
Filesize
289B
MD559386c53f2570f0e370e2ece30ccce7a
SHA1b2fe2bc41bc2c07a33ebbc2e3ec6e30229215d69
SHA2563b845724fd74dd2034ec56d4a2ecacc2dd49e0b388bf68f2e9546b9f8fa8065f
SHA5123dd155da349193d5b1c185c52b2bd5b66edcff318d4fb051799523c490f6a95c9da85ab8dc203334b4630c978b0cb6fa70fcc54497e33ea1b9c91f4497541569
-
Filesize
696B
MD5e9272f583ca9d4a0e7aaf0d594f491bc
SHA177474a308a2d2470bcfa03ba2e34cfe80fda9cfd
SHA25698bdfee86496046e6e8a8ca199129eaa2dceb4dea2d7ed4ef4c4145ddb1a965e
SHA51283e5858a9b1456c2d1a85c1adee0dd0de589966556cddf17a23ebd16f285a323173a820d292e515e29d2f7889444f44214e75170e972aa66e3977f5034c7df1d