Analysis
-
max time kernel
95s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
StormalPingOptimizer3.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
StormalPingOptimizer3.bat
Resource
win10v2004-20241007-en
General
-
Target
StormalPingOptimizer3.bat
-
Size
23KB
-
MD5
3969cbc19100bf1395d260fe1b0042c2
-
SHA1
9e861adf987e3976bd530ed0ace794505e36be46
-
SHA256
0de38bfd80074a77b5e35dcce88f897a89a00d2c65bcbe7757eec9260e4ac218
-
SHA512
f3ca0522c387197cfa9de3f2ce9ee5137294c2c1a7890c3fcb2593b861c0b5aaadddc769805a8a90628ffe9cb00f221c47d8a74797f51f4b73d94daa2caf07f5
-
SSDEEP
384:POZplr56yGuQRaIMYQ8//5zYAq62N71CnzkclqBkPKqoKHKDKOK8KIK8XKBK2KHH:4GuQRaIMYQ8//5zYAq62fhbIg
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 raw.githubusercontent.com 19 raw.githubusercontent.com -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1852 sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2876 cmd.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2912 timeout.exe 3528 timeout.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4432 2876 cmd.exe 83 PID 2876 wrote to memory of 4432 2876 cmd.exe 83 PID 2876 wrote to memory of 3620 2876 cmd.exe 84 PID 2876 wrote to memory of 3620 2876 cmd.exe 84 PID 2876 wrote to memory of 1852 2876 cmd.exe 85 PID 2876 wrote to memory of 1852 2876 cmd.exe 85 PID 2876 wrote to memory of 3404 2876 cmd.exe 86 PID 2876 wrote to memory of 3404 2876 cmd.exe 86 PID 2876 wrote to memory of 4900 2876 cmd.exe 87 PID 2876 wrote to memory of 4900 2876 cmd.exe 87 PID 2876 wrote to memory of 3856 2876 cmd.exe 88 PID 2876 wrote to memory of 3856 2876 cmd.exe 88 PID 2876 wrote to memory of 2912 2876 cmd.exe 89 PID 2876 wrote to memory of 2912 2876 cmd.exe 89 PID 2876 wrote to memory of 4420 2876 cmd.exe 90 PID 2876 wrote to memory of 4420 2876 cmd.exe 90 PID 2876 wrote to memory of 1976 2876 cmd.exe 91 PID 2876 wrote to memory of 1976 2876 cmd.exe 91 PID 2876 wrote to memory of 3528 2876 cmd.exe 92 PID 2876 wrote to memory of 3528 2876 cmd.exe 92 PID 2876 wrote to memory of 3196 2876 cmd.exe 97 PID 2876 wrote to memory of 3196 2876 cmd.exe 97
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\StormalPingOptimizer3.bat"1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\mode.commode con: cols=160 lines=802⤵PID:4432
-
-
C:\Windows\system32\fltMC.exefltmc2⤵PID:3620
-
-
C:\Windows\system32\sc.exesc query "WinDefend"2⤵
- Launches sc.exe
PID:1852
-
-
C:\Windows\system32\find.exefind "STATE"2⤵PID:3404
-
-
C:\Windows\system32\find.exefind "RUNNING"2⤵PID:4900
-
-
C:\Windows\system32\curl.execurl -s -L "https://github.com/QuakedK/Downloads/raw/main/DelayDestroyerTools.zip" -o "C:\\Delay Destroyer Tools.zip"2⤵PID:3856
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2912
-
-
C:\Windows\system32\tar.exetar -xf "C:\\Delay Destroyer Tools.zip" --strip-components=12⤵PID:4420
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1976
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:3528
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:3196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a37d8156540348a1066a1c92610bf064
SHA15d0c564df8ab50c3ceef30dedacc5fcdb657d8f7
SHA2560afe0a002a7471f0a26ccd202010e22f6c1af7fd89814622376734143c791717
SHA51297c9bd1ded1f7698fec44c4ceb2af09005061f855bb68fe5e7f789a7c89e43b4fb1651764b4f0a1633f270996132751f256c3f19269a04baefa5765f673facbb