Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-11-2024 06:22

General

  • Target

    Files/Apps/fastfetch.bat

  • Size

    375B

  • MD5

    ee8a03fcbbfb22f1d163049207579c43

  • SHA1

    8d5f8aedc16d9840e71217bc65d3a6b49416c73a

  • SHA256

    b47a0737e02f77f70b6686f9c8de6f669586ed4e13d4f6d985d7097207601209

  • SHA512

    9cbeede49c420fee887513f285a3c4b4e358b180a4f544366dc6cc624dd59f707a6f4f1fb5dd1b149def44b9b9c3659ed73046a38258575c91fc8cf1ca6eb187

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Files\Apps\fastfetch.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ver
      2⤵
        PID:4016
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c chcp
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\system32\chcp.com
          chcp
          3⤵
            PID:4964
        • C:\Windows\system32\chcp.com
          chcp 65001
          2⤵
            PID:4424
          • C:\Windows\system32\chcp.com
            chcp 437
            2⤵
              PID:3080
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser -Force"
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4900
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "iwr -useb get.scoop.sh | iex"
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3772
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              2⤵
              • Delays execution with timeout.exe
              PID:1352

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d136d3411d4aa688242c53cafb993aa6

            SHA1

            1a81cc78e3ca445d5a5193e49ddce26d5e25179f

            SHA256

            00ae5433c0107cc164516c7849b4cff7b6faeb52e5afa65c01dbd8c7a5efe397

            SHA512

            282ea53f8093c00e8c64d253782068211f8c4187391d5078755f55dedb8825c0042173d82f489d7b6c06e88184b70e83c1e92dadb80f57bd96c95855ac6b3da1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            5caad758326454b5788ec35315c4c304

            SHA1

            3aef8dba8042662a7fcf97e51047dc636b4d4724

            SHA256

            83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

            SHA512

            4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gkotk0mz.154.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/4900-0-0x00007FFE106E3000-0x00007FFE106E5000-memory.dmp

            Filesize

            8KB

          • memory/4900-1-0x000001DD491B0000-0x000001DD491D2000-memory.dmp

            Filesize

            136KB

          • memory/4900-11-0x00007FFE106E0000-0x00007FFE111A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4900-12-0x00007FFE106E0000-0x00007FFE111A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4900-15-0x00007FFE106E0000-0x00007FFE111A1000-memory.dmp

            Filesize

            10.8MB