General
-
Target
WINCL 1.8.0.bat
-
Size
1.3MB
-
Sample
241129-y1x12atqd1
-
MD5
3de7393999fb7fa0931e95a0ecc28064
-
SHA1
a26172904b514a1d0b96f671af9cf57c0433a69f
-
SHA256
a5a0b353ba2e76e46e3566329f212aaf71c7acc7d0dd4c2689dad5d543effa13
-
SHA512
e6ea002fde658e4e4efc4986b19745374af5555c623f2674030e46a279f5d6fd26a7660e208899a0a41acdc99925771ea972ef54939d4c6bc716612b7f4d3f13
-
SSDEEP
12288:RBCF22juRhMkbZubgbab/b+BV0L6clOXs1w:RXMkk82zwb
Static task
static1
Behavioral task
behavioral1
Sample
WINCL 1.8.0.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
WINCL 1.8.0.bat
-
Size
1.3MB
-
MD5
3de7393999fb7fa0931e95a0ecc28064
-
SHA1
a26172904b514a1d0b96f671af9cf57c0433a69f
-
SHA256
a5a0b353ba2e76e46e3566329f212aaf71c7acc7d0dd4c2689dad5d543effa13
-
SHA512
e6ea002fde658e4e4efc4986b19745374af5555c623f2674030e46a279f5d6fd26a7660e208899a0a41acdc99925771ea972ef54939d4c6bc716612b7f4d3f13
-
SSDEEP
12288:RBCF22juRhMkbZubgbab/b+BV0L6clOXs1w:RXMkk82zwb
-
Modifies boot configuration data using bcdedit
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1