Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 11:57

General

  • Target

    bat[1].bat

  • Size

    4.9MB

  • MD5

    cbbb8311a661135f846908c85c3aa59f

  • SHA1

    d1d00695d65c8be7328881a7e24a2d844f1e5428

  • SHA256

    cc1edd890563ed822c714ec97f4d8431d679161b89ee035e907b1d6df09c03e5

  • SHA512

    83bc82a91dae947a202dec6bdce3ffeafca4e111afbbdfe5fe8394ed2da6bc9d884f058b045381bb86a91a883aae89b0172839f9a2eb0a7dc5e8d5ca97a49beb

  • SSDEEP

    49152:et6+yh48tXPwBb78W9yt3xBjtPm/pAEmbHqTN0Q1ScyHqAM/Lt2nTwKYR4tiZB:c

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\bat[1].bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2392
    • C:\Windows\system32\findstr.exe
      findstr /i "DADY HARDDISK QEMU HARDDISK WDS100T2B0A"
      2⤵
        PID:828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads