Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 06:07

General

  • Target

    easy-service-1.0.11/bin/register-this-path.bat

  • Size

    187B

  • MD5

    43a15d99c1f016b1afc9babd1e6cddfe

  • SHA1

    9a8b5f7ec3a1bab54ef8e6a84396aa269f6ed9be

  • SHA256

    034d54e89019955f44add6fb9da587ea7dc5473ff71f745c0f062aeb658ec452

  • SHA512

    a5ba7550a92f93ad2db44e40afb2f82f8f644c717ef44005b38c39e51f5a6f9820375bcc298353143b82913d0a056266bb7cbc910adeccb1f3796f470045ab3c

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\easy-service-1.0.11\bin\register-this-path.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -c [Environment]::SetEnvironmentVariable('Path',[Environment]::GetEnvironmentVariable('Path','Machine')+';C:\Users\Admin\AppData\Local\Temp\easy-service-1.0.11\bin\','Machine')
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2708-4-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

          Filesize

          4KB

        • memory/2708-5-0x000000001B810000-0x000000001BAF2000-memory.dmp

          Filesize

          2.9MB

        • memory/2708-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

          Filesize

          32KB

        • memory/2708-8-0x0000000002D8B000-0x0000000002DF2000-memory.dmp

          Filesize

          412KB

        • memory/2708-7-0x0000000002D84000-0x0000000002D87000-memory.dmp

          Filesize

          12KB

        • memory/2708-9-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

          Filesize

          9.6MB