Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 02:38

General

  • Target

    $_39_/bn.bat

  • Size

    885B

  • MD5

    b8f5f8991353b53c34e6909eced64f13

  • SHA1

    5e039faaf0125202fec8087475c62248de7a3976

  • SHA256

    f9b7a1395cd60cf2c03bc5b48c81742a6e2a9fc5f5d14dfb48232678c83f272e

  • SHA512

    4e5b61f09a6672e4fd93ebccfc8ef25139db6e5200a8203b3950a68cb3251316aef30f86facc1f7560a7f1215647d63cdae0b0fd5ae094097ed180856206ef70

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\$_39_\bn.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2524
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2168
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1508
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1032
    • C:\Users\Admin\AppData\Local\Temp\$_39_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads