Resubmissions

13/10/2024, 20:30

241013-zalezs1fmn 6

13/10/2024, 20:28

241013-y86cdaxalb 6

Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/10/2024, 20:30

General

  • Target

    Launcher.bat

  • Size

    5KB

  • MD5

    79e427676f790a73c7eace4401235a43

  • SHA1

    522b5b923e6711bbdeff463f95b863c724a16593

  • SHA256

    199066e589da3542f2540d91dccdb512561d2241ecc1199ca9fe4131566954f3

  • SHA512

    5e8383871e2397ee4eccf11f2494f9196655961ddb941681e8574158dcfa19d11f42ffc97f418f5129479fddb2570e7bf3347eb8aff1d8657ea6d3b61804b804

  • SSDEEP

    3:LjdIV9ZbLRJFFaR2/+ZFBW6:FIRI9FV

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\compiler.exe
      compiler.exe conf.txt
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1588
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 13:51 /f /tn MicrosoftEdgeUpdateTaskMachineCore_ODA3 /tr ""C:\Users\Admin\AppData\Local\ODA3\ODA3.exe" "C:\Users\Admin\AppData\Local\ODA3\conf.txt""
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3440
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 13:51 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-64-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-61-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-62-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-80-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/1588-85-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/1588-78-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/1588-77-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/1588-76-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/1588-60-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-59-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-58-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-56-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-55-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-53-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-52-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-51-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-50-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-48-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-47-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-46-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-45-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-44-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-43-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-42-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-41-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-40-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-39-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-37-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-36-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-35-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-34-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-33-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-32-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-31-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-30-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-29-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-28-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-26-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-24-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-23-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-22-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-21-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-20-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-16-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-15-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-14-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-13-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-12-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-11-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-10-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-8-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-7-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-6-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-5-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-3-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-2-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-57-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-54-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-49-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-38-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-27-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-25-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-19-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-18-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-17-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-9-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-4-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-1-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-0-0x000000007EE90000-0x000000007EEA0000-memory.dmp

    Filesize

    64KB

  • memory/1588-169-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB