Analysis

  • max time kernel
    42s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 17:48

General

  • Target

    Install_New_theme.bat

  • Size

    600B

  • MD5

    99638e3caf39bd8aac3010f291727fcd

  • SHA1

    f688f9f969ffaf78c62f17f8a8df44490b952514

  • SHA256

    a461119f4dcaca45b8438792b6daba9a83d520f47127ebb7a7ed6d68c0ac1008

  • SHA512

    638bdc5e83558daf1c3d14e1ef3669d578ce3bc0df7c4643441e00d1d334397d409bb1329f07d559f0b7de21cfee406abfde24f7bc4d3129f2cf52e53612e84f

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Install_New_theme.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12; $p='-new_theme'; """ & { $(try { iwr -useb 'https://raw.githubusercontent.com/SpotX-Official/spotx-official.github.io/main/run.ps1' } catch { $p+= ' -m'; iwr -useb 'https://spotx-official.github.io/run.ps1' })} $p """" | iex
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\system32\curl.exe
        "C:\Windows\system32\curl.exe" -V
        3⤵
          PID:4512
        • C:\Windows\system32\curl.exe
          "C:\Windows\system32\curl.exe" -Is -w "%{http_code} \n" -o /dev/null -k https://download.scdn.co/upgrade/client/win32-x86/spotify_installer-1.2.48.405.gf2c48e6f-2008.exe --retry 2 --ssl-no-revoke
          3⤵
            PID:348
          • C:\Windows\system32\curl.exe
            "C:\Windows\system32\curl.exe" -q -k https://download.scdn.co/upgrade/client/win32-x86/spotify_installer-1.2.48.405.gf2c48e6f-2008.exe -o C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe --progress-bar --retry 3 --ssl-no-revoke
            3⤵
              PID:1212
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe" C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe
              3⤵
                PID:4768
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:4444
            • C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe
              "C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Users\Admin\AppData\Roaming\Spotify\Spotify.exe
                Spotify.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:3180

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zd2z0qfn.szm.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Roaming\Spotify\Spotify.exe

            Filesize

            26.6MB

            MD5

            fe1def21770cd83425dbab7fcca56ffe

            SHA1

            0dcb1e017449599d313e196a76ef533d8545fb5f

            SHA256

            72153921a5ba44466c5b05ce87b55dd6355a784fb1d037a79493a62892fd3ef7

            SHA512

            fa7fbcb606ed931440ce8c68ebedea1e7c8c0389ef845a7fa03992e485f548915972f8a46c8f7720433477f7de4360deb467ce613f2760115e748693f752a57c

          • C:\Users\Admin\AppData\Roaming\Spotify\chrome_elf.dll

            Filesize

            1.0MB

            MD5

            0c30ec2cab53f9a55055fa34d4884bd9

            SHA1

            4d29c1ebd563abf5aadb54e9322a746cdd14a864

            SHA256

            efadc39759861edfea81980190cd0e2d2c4e7159e79b092936776efba1298f8e

            SHA512

            03ff6348ff4448526926d4825604c395181f4114f2d5ca2fba258aa7ae8a57374e6cfbc693faf2653f9a79ee022f161a9e1ab4e682e6fefdab6e05dc8f7080f3

          • memory/1964-18-0x0000029E42B60000-0x0000029E42B6A000-memory.dmp

            Filesize

            40KB

          • memory/1964-20-0x0000029E42BA0000-0x0000029E42BC6000-memory.dmp

            Filesize

            152KB

          • memory/1964-13-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-14-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-15-0x0000029E42B70000-0x0000029E42B9A000-memory.dmp

            Filesize

            168KB

          • memory/1964-16-0x0000029E42B70000-0x0000029E42B94000-memory.dmp

            Filesize

            144KB

          • memory/1964-17-0x0000029E42B40000-0x0000029E42B56000-memory.dmp

            Filesize

            88KB

          • memory/1964-0-0x00007FFDD2A33000-0x00007FFDD2A35000-memory.dmp

            Filesize

            8KB

          • memory/1964-19-0x0000029E42BD0000-0x0000029E42BF6000-memory.dmp

            Filesize

            152KB

          • memory/1964-12-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-21-0x0000029E42C50000-0x0000029E42C64000-memory.dmp

            Filesize

            80KB

          • memory/1964-22-0x00007FFDD2A33000-0x00007FFDD2A35000-memory.dmp

            Filesize

            8KB

          • memory/1964-23-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-24-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-26-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/1964-11-0x0000029E42760000-0x0000029E42782000-memory.dmp

            Filesize

            136KB

          • memory/1964-7-0x00007FFDD2A30000-0x00007FFDD34F1000-memory.dmp

            Filesize

            10.8MB

          • memory/3180-227-0x0000000000690000-0x0000000002150000-memory.dmp

            Filesize

            26.8MB

          • memory/3180-231-0x0000000000690000-0x0000000002150000-memory.dmp

            Filesize

            26.8MB