Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 08:52

General

  • Target

    IAS.cmd

  • Size

    31KB

  • MD5

    e2e2b6fb84ed23b2950f26939c36fdf5

  • SHA1

    7988b5c71397db6fc4a611a54f7d5622eef73f40

  • SHA256

    e06c490758709eff468df8f8afda86b8411758fd93ee16e14e6153de5ee933e2

  • SHA512

    70a14feca5efc2e699ab9f190fd508cf5aab0daa5c8447ac06f7da0b1cb32bd1781b5fa91440483b2fb4eac10ebd611b28e582ee364d2681bb131eee1fb9aeaf

  • SSDEEP

    384:mNnhCo3piIUTUq5rrQmJbnl7+qK14TEJYab:mNn/ZiBAq5rrQmFl7G4gJYab

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 5 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\IAS.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\System32\sc.exe
      sc query Null
      2⤵
      • Launches sc.exe
      PID:2300
    • C:\Windows\System32\find.exe
      find /i "RUNNING"
      2⤵
        PID:2204
      • C:\Windows\System32\findstr.exe
        findstr /v "$" "IAS.cmd"
        2⤵
          PID:1124
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          2⤵
            PID:2328
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\IAS.cmd" "
            2⤵
              PID:1952
            • C:\Windows\System32\find.exe
              find /i "C:\Users\Admin\AppData\Local\Temp"
              2⤵
                PID:2336
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe "$f=[io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\IAS.cmd') -split ':PowerShellTest:\s*';iex ($f[1])"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2572
              • C:\Windows\System32\find.exe
                find /i "FullLanguage"
                2⤵
                  PID:2560
                • C:\Windows\System32\fltMC.exe
                  fltmc
                  2⤵
                    PID:2500
                  • C:\Windows\System32\reg.exe
                    reg query HKCU\Console /v QuickEdit
                    2⤵
                    • Modifies registry key
                    PID:2580
                  • C:\Windows\System32\find.exe
                    find /i "0x0"
                    2⤵
                      PID:892
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ping -4 -n 1 iasupdatecheck.massgrave.dev
                      2⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:3040
                      • C:\Windows\System32\PING.EXE
                        ping -4 -n 1 iasupdatecheck.massgrave.dev
                        3⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2768
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe "Get-WmiObject -Class Win32_ComputerSystem | Select-Object -Property CreationClassName"
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2892
                    • C:\Windows\System32\find.exe
                      find /i "computersystem"
                      2⤵
                        PID:2908
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" 2>nul
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2612
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2636
                      • C:\Windows\System32\reg.exe
                        reg query HKU\\Software
                        2⤵
                          PID:2332
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid" 2>nul
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2624
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid"
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1028
                        • C:\Windows\System32\reg.exe
                          reg query HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software
                          2⤵
                            PID:3008
                          • C:\Windows\System32\reg.exe
                            reg delete HKCU\IAS_TEST /f
                            2⤵
                            • Modifies registry key
                            PID:1484
                          • C:\Windows\System32\reg.exe
                            reg delete HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\IAS_TEST /f
                            2⤵
                              PID:2972
                            • C:\Windows\System32\reg.exe
                              reg add HKCU\IAS_TEST
                              2⤵
                              • Modifies registry key
                              PID:2992
                            • C:\Windows\System32\reg.exe
                              reg query HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\IAS_TEST
                              2⤵
                                PID:1640
                              • C:\Windows\System32\reg.exe
                                reg delete HKCU\IAS_TEST /f
                                2⤵
                                • Modifies registry key
                                PID:2352
                              • C:\Windows\System32\reg.exe
                                reg delete HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\IAS_TEST /f
                                2⤵
                                  PID:1776
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                  2⤵
                                    PID:576
                                    • C:\Windows\System32\reg.exe
                                      reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                      3⤵
                                        PID:2840
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\DownloadManager" /v ExePath 2>nul
                                      2⤵
                                        PID:1996
                                        • C:\Windows\System32\reg.exe
                                          reg query "HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\DownloadManager" /v ExePath
                                          3⤵
                                            PID:2604
                                        • C:\Windows\System32\reg.exe
                                          reg add HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                          2⤵
                                          • Modifies registry class
                                          PID:2720
                                        • C:\Windows\System32\reg.exe
                                          reg query HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                          2⤵
                                            PID:2836
                                          • C:\Windows\System32\reg.exe
                                            reg delete HKU\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST /f
                                            2⤵
                                            • Modifies registry class
                                            PID:2952
                                          • C:\Windows\System32\mode.com
                                            mode 75, 28
                                            2⤵
                                              PID:2824
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell.exe write-host -back '"Black"' -fore '"Gray"' '" "' -NoNewline; write-host -back '"Black"' -fore '"Green"' '"Enter a menu option in the Keyboard [1,2,3,4,5,0]"'
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2980
                                            • C:\Windows\System32\choice.exe
                                              choice /C:123450 /N
                                              2⤵
                                                PID:1860
                                              • C:\Windows\System32\mode.com
                                                mode 113, 35
                                                2⤵
                                                  PID:800
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe "&{$W=$Host.UI.RawUI.WindowSize;$B=$Host.UI.RawUI.BufferSize;$W.Height=34;$B.Height=300;$Host.UI.RawUI.WindowSize=$W;$Host.UI.RawUI.BufferSize=$B;}"
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1148
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe write-host -back '"Black"' -fore '"Gray"' '" "' -NoNewline; write-host -back '"Black"' -fore '"Green"' '"Its recommended to use Freeze Trial option instead."'
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1940
                                                • C:\Windows\System32\choice.exe
                                                  choice /C:19 /N /M "> [1] Go Back [9] Activate : "
                                                  2⤵
                                                    PID:1916
                                                  • C:\Windows\System32\mode.com
                                                    mode 75, 28
                                                    2⤵
                                                      PID:2144
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell.exe write-host -back '"Black"' -fore '"Gray"' '" "' -NoNewline; write-host -back '"Black"' -fore '"Green"' '"Enter a menu option in the Keyboard [1,2,3,4,5,0]"'
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2104
                                                    • C:\Windows\System32\choice.exe
                                                      choice /C:123450 /N
                                                      2⤵
                                                        PID:3068
                                                      • C:\Windows\System32\mode.com
                                                        mode 113, 35
                                                        2⤵
                                                          PID:2600
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe "&{$W=$Host.UI.RawUI.WindowSize;$B=$Host.UI.RawUI.BufferSize;$W.Height=34;$B.Height=300;$Host.UI.RawUI.WindowSize=$W;$Host.UI.RawUI.BufferSize=$B;}"
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2272
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe write-host -back '"Red"' -fore '"white"' '"IDM [Internet Download Manager] is not Installed."'
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1816
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe write-host -back '"Black"' -fore '"Yellow"' '"Press any key to return..."'
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1552
                                                        • C:\Windows\System32\mode.com
                                                          mode 75, 28
                                                          2⤵
                                                            PID:952
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell.exe write-host -back '"Black"' -fore '"Gray"' '" "' -NoNewline; write-host -back '"Black"' -fore '"Green"' '"Enter a menu option in the Keyboard [1,2,3,4,5,0]"'
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:596
                                                          • C:\Windows\System32\choice.exe
                                                            choice /C:123450 /N
                                                            2⤵
                                                              PID:1072

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            7f25dd09a9a9eaf40f21f59d1c788acb

                                                            SHA1

                                                            d377847de8ec1be2d7c50e434630f1f4f35d9af0

                                                            SHA256

                                                            6164796cd789b35158f0d6b5c7d44707870caff8d764dc0825ecd7688060070c

                                                            SHA512

                                                            808f1528bacdac3d092ba02c8bb7e81f555fe6807cdc53bbee58505ae89f0b6c7317e8d338a8a0c6f8ca9dae1ac66a460865e24797ce8ce1b76891e9e6f96c8f

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            593b2196ceaeba8d7c25f6adcb60d326

                                                            SHA1

                                                            aa557e348dd415d5eb09562ff0294457f1dcc325

                                                            SHA256

                                                            863f2888c6bead6ac629295683acdf034eff59c16d954ae8740af34e704db7de

                                                            SHA512

                                                            55f9c1b1c7f7a5f11e06427af96497b6d468ba812923cb87c43aa0a460fabc314fb443005b5f5a89a1843603fe9b75b1357a48bd5f848e6746d7918705e1e635

                                                          • memory/2572-4-0x000007FEF579E000-0x000007FEF579F000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2572-5-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/2572-6-0x00000000022C0000-0x00000000022C8000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/2572-8-0x0000000002D4B000-0x0000000002DB2000-memory.dmp

                                                            Filesize

                                                            412KB

                                                          • memory/2572-7-0x0000000002D44000-0x0000000002D47000-memory.dmp

                                                            Filesize

                                                            12KB

                                                          • memory/2572-9-0x000007FEF54E0000-0x000007FEF5E7D000-memory.dmp

                                                            Filesize

                                                            9.6MB

                                                          • memory/2892-15-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/2892-16-0x00000000028E0000-0x00000000028E8000-memory.dmp

                                                            Filesize

                                                            32KB