Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
AncelsPerformanceBatch.bat
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
AncelsPerformanceBatch.bat
Resource
win10v2004-20240802-en
20 signatures
150 seconds
General
-
Target
AncelsPerformanceBatch.bat
-
Size
165KB
-
MD5
95e5072c5582d546e2bd42eee4642376
-
SHA1
e920b5930456311885ed1506d2b6eee76d745bf1
-
SHA256
a1af1cebcb9b024f05690fd07e65a7363e3bc0395cfc788102e9a907e76dda03
-
SHA512
597caafd90f4ac9177bd9de3fe3523b2a8711596b93d9eb1e0a97efc08dad8033772040c35471b6ebd74d992676da485c7542776c2f062a2bdbad234aea2ee7d
-
SSDEEP
1536:dl2cSlFWJQlpTUgIafq+2RSM88xck4YaXv5n1kwM+ZA:7aNJ4cFuL
Score
6/10
Malware Config
Signatures
-
pid Process 2824 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 powershell.exe 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2824 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2824 2688 cmd.exe 32 PID 2688 wrote to memory of 2824 2688 cmd.exe 32 PID 2688 wrote to memory of 2824 2688 cmd.exe 32 PID 2688 wrote to memory of 2844 2688 cmd.exe 33 PID 2688 wrote to memory of 2844 2688 cmd.exe 33 PID 2688 wrote to memory of 2844 2688 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AncelsPerformanceBatch.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Set-ExecutionPolicy Unrestricted"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\reg.exereg add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2844
-