Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
Resource
win10v2004-20241007-en
General
-
Target
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
-
Size
395B
-
MD5
21138c5f0fc42e27b57cbadc4cfcb7b7
-
SHA1
ebc7fb05fd67b43925ec4ee2a43a2f3152712b28
-
SHA256
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23
-
SHA512
20d832e675d2aab97df7fc10bad055f96327f782224c0a1c0f10c4d7cf01ccc7428ab934da889935c2e67d6fac959c1f52d796314988168844c5f079b55d67f1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3052 3912 cmd.exe 85 PID 3912 wrote to memory of 3052 3912 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\xcopy.exexcopy /Y /I /S "C:\Users\Admin\AppData\Local\Temp\*" "C:\Users\Admin\AppData\Roaming\fat\"2⤵PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58