Analysis
-
max time kernel
90s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
BadZone SCP_SL/ENG/Injector.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
BadZone SCP_SL/ENG/LokiSCPSL.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
BadZone SCP_SL/ENG/start.bat
Resource
win11-20241023-en
Behavioral task
behavioral4
Sample
BadZone SCP_SL/RUS/Injector.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
BadZone SCP_SL/RUS/LokiSCPSL.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
BadZone SCP_SL/RUS/start.bat
Resource
win11-20241007-en
General
-
Target
BadZone SCP_SL/ENG/start.bat
-
Size
62B
-
MD5
019b6ed1cbc0b959f60079a7f37fb2dd
-
SHA1
3ce5de167d13e8835b8a40017a80840c906fe075
-
SHA256
b12c2d340a4df769f2e21496d29e510e662764b5c4086c4d29da436a792dd9a6
-
SHA512
748a5d6949bb5d86099c2bc860681565e05bd7e9668d5648d0ae70b1676d80e431efd40105493db5c34d4a112cbba24af1abec46bee5456ff375f6fdf0497572
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Injector.exepid process 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe 4848 Injector.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2772 wrote to memory of 4848 2772 cmd.exe Injector.exe PID 2772 wrote to memory of 4848 2772 cmd.exe Injector.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\BadZone SCP_SL\ENG\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\BadZone SCP_SL\ENG\Injector.exeInjector.exe LokiSCPSL.dll SCPSL.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848