Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:23

General

  • Target

    c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat

  • Size

    395B

  • MD5

    21138c5f0fc42e27b57cbadc4cfcb7b7

  • SHA1

    ebc7fb05fd67b43925ec4ee2a43a2f3152712b28

  • SHA256

    c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23

  • SHA512

    20d832e675d2aab97df7fc10bad055f96327f782224c0a1c0f10c4d7cf01ccc7428ab934da889935c2e67d6fac959c1f52d796314988168844c5f079b55d67f1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Windows\system32\xcopy.exe
      xcopy /Y /I /S "C:\Users\Admin\AppData\Local\Temp\*" "C:\Users\Admin\AppData\Roaming\fat\"
      2⤵
        PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\fat\wct3C87.tmp

      Filesize

      63KB

      MD5

      e516a60bc980095e8d156b1a99ab5eee

      SHA1

      238e243ffc12d4e012fd020c9822703109b987f6

      SHA256

      543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

      SHA512

      9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58