Resubmissions

09/11/2024, 22:49

241109-2r2veatfrl 10

09/11/2024, 22:47

241109-2qkjqssrdz 10

09/11/2024, 22:46

241109-2p2fvstfqj 10

09/11/2024, 22:44

241109-2nsgkasrbt 10

07/11/2024, 16:00

241107-tfl1taxpgl 10

10/02/2024, 17:17

240210-vtnl8sge36 10

Analysis

  • max time kernel
    120s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 22:44

General

  • Target

    ggpermV3/woof.bat

  • Size

    1KB

  • MD5

    9dfe4e730dcc5e0d3951038ad2a095a1

  • SHA1

    e033d9a40234b9544606ec4d603add264cb38841

  • SHA256

    bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8

  • SHA512

    297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Drops file in System32 directory 14 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: LoadsDriver 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
      AMIDEWINx64.EXE /SS 1359515080620915275
      2⤵
        PID:4864
      • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
        AMIDEWINx64.EXE /SS 184281164685525346
        2⤵
          PID:3552
        • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
          AMIDEWINx64.EXE /BS 2393222718149408448
          2⤵
            PID:4284
          • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
            AMIDEWINx64.EXE /SV 31112321982815329518
            2⤵
              PID:2472
            • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
              AMIDEWINx64.EXE /BV 1522132601769823273
              2⤵
                PID:1496
              • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                AMIDEWINx64.EXE /CS 208929886632422994
                2⤵
                  PID:2840
                • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                  AMIDEWINx64.EXE /PSN 20552326721455730984
                  2⤵
                    PID:2268
                  • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                    AMIDEWINx64.EXE /SU AUTO
                    2⤵
                      PID:4636
                    • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                      AMIDEWINx64.EXE /PAT 28627135071546827315
                      2⤵
                        PID:1732
                      • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                        AMIDEWINx64.EXE /PPN 302198105218357330
                        2⤵
                          PID:2248
                        • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                          AMIDEWINx64.EXE /IV 2018673362004120215
                          2⤵
                            PID:4872
                          • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                            AMIDEWINx64.EXE /SM 6183304935661801
                            2⤵
                              PID:3880
                            • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                              AMIDEWINx64.EXE /SP 9463286753165622283
                              2⤵
                                PID:2020
                              • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                AMIDEWINx64.EXE /BS 153204804326358339
                                2⤵
                                  PID:4704
                                • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                  AMIDEWINx64.EXE /SF 5247195342421723870
                                  2⤵
                                    PID:3960
                                  • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                    AMIDEWINx64.EXE /BM 22704308261497418986
                                    2⤵
                                      PID:4360
                                    • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                      AMIDEWINx64.EXE /BP 113582285760814404
                                      2⤵
                                        PID:4808
                                      • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                        AMIDEWINx64.EXE /BT 2761161643628858
                                        2⤵
                                          PID:1500
                                        • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                          AMIDEWINx64.EXE /BLC 14483223911432415796
                                          2⤵
                                            PID:1832
                                          • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                            AMIDEWINx64.EXE /CM 23229197082396827455
                                            2⤵
                                              PID:2996
                                            • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                              AMIDEWINx64.EXE /CT 25265160281497921641
                                              2⤵
                                                PID:2836
                                              • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                                AMIDEWINx64.EXE /CV 26424120531259920820
                                                2⤵
                                                  PID:764
                                                • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                                  AMIDEWINx64.EXE /CA 88002771791956053
                                                  2⤵
                                                    PID:3616
                                                  • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                                    AMIDEWINx64.EXE /CO 72707815573226044
                                                    2⤵
                                                      PID:1696
                                                    • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                                      AMIDEWINx64.EXE /CSK 3221725152126102121
                                                      2⤵
                                                        PID:2540
                                                      • C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXE
                                                        AMIDEWINx64.EXE /SK 19709811726934317
                                                        2⤵
                                                          PID:3540
                                                        • C:\Windows\system32\net.exe
                                                          net stop winmgmt /y
                                                          2⤵
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2904
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop winmgmt /y
                                                            3⤵
                                                              PID:4920
                                                          • C:\Windows\system32\net.exe
                                                            net start winmgmt /y
                                                            2⤵
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2220
                                                            • C:\Windows\system32\net1.exe
                                                              C:\Windows\system32\net1 start winmgmt /y
                                                              3⤵
                                                                PID:216
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop winmgmt
                                                              2⤵
                                                              • Launches sc.exe
                                                              PID:320
                                                            • C:\Windows\system32\sc.exe
                                                              sc start winmgmt
                                                              2⤵
                                                              • Launches sc.exe
                                                              PID:4076
                                                            • C:\Windows\system32\ipconfig.exe
                                                              ipconfig /flushdns
                                                              2⤵
                                                              • Gathers network information
                                                              PID:1688
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                            • Drops file in System32 directory
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3664
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:4284
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                              • Drops file in System32 directory
                                                              PID:4236
                                                            • C:\Windows\system32\taskmgr.exe
                                                              "C:\Windows\system32\taskmgr.exe" /7
                                                              1⤵
                                                              • Checks SCSI registry key(s)
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:1916

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Windows\system32\wbem\repository\MAPPING3.MAP

                                                              Filesize

                                                              207KB

                                                              MD5

                                                              ccef225b2c0c8fbb37b24de18e87a320

                                                              SHA1

                                                              4d3ca45da62bde453bee76cd2ba44c0797285a30

                                                              SHA256

                                                              0cf3af3e88a585b9107d624e13f703e0d01b3ff30f1010c54dd0855a8ea95375

                                                              SHA512

                                                              da0951e0bc29273cebd032f071e290d7ede2f6e1ef478e694624468139e9883ed18b253227ebe7673c5aeb152aa15a6468d7760c18bdbf2246c311f6753ac625

                                                            • memory/1916-2-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-4-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-3-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-14-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-13-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-12-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-11-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-10-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-9-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1916-8-0x000001F7BC750000-0x000001F7BC751000-memory.dmp

                                                              Filesize

                                                              4KB