Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
pc-checker-main/checker.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pc-checker-main/checker.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pc-checker-main/start.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
pc-checker-main/start.bat
Resource
win10v2004-20241007-en
General
-
Target
pc-checker-main/start.bat
-
Size
664B
-
MD5
4eb24a33e1103e57618ff575a083918a
-
SHA1
369d1081dc4be591d6b3a20b87023caee94168d4
-
SHA256
ed7f055858501ba1154b856699bb3724b954348ecb68c227c9fe8e5723bb525b
-
SHA512
129afaf6cb4c29f35629df9feba28cc90e738a6a9a5fe99261c89b622bde133a57e07f5512c54f4a49d5ef19c39584d718e28214a6bcdbffd6c076e2ee34e111
Malware Config
Signatures
-
Download via BitsAdmin 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2092 wrote to memory of 316 2092 cmd.exe bitsadmin.exe PID 2092 wrote to memory of 316 2092 cmd.exe bitsadmin.exe PID 2092 wrote to memory of 316 2092 cmd.exe bitsadmin.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\pc-checker-main\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\bitsadmin.exebitsadmin /transfer "T├⌐l├⌐chargement_NodeJS" https://nodejs.org/dist/v20.11.1/node-v20.11.1-x64.msi "C:\Users\Admin\AppData\Local\Temp\pc-checker-main\node_installer.msi"2⤵
- Download via BitsAdmin
PID:316
-