Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    30-11-2024 00:36

General

  • Target

    FoxOS v3.bat

  • Size

    49KB

  • MD5

    12d029a7e23cf93caf2861388cdc621f

  • SHA1

    e6ed2fca26736853e6259cd204acfc0258d8504d

  • SHA256

    14d7c600241a47f887312eeefd191744372d082dcb7d2925a36bad24f4e3723d

  • SHA512

    cd111ec1a28976110e82524d4e06c67171b926e1b52c325bed3c9685b772a36ac7844e5d627a612e8a7f51b6ab973ca6426d347fd9ef4b4da987bbb0100cf1fe

  • SSDEEP

    768:DJDybQxERltKtG3c1PsPQSAqEu36pvbsA0aDm3vDkZ/a9Jk:DJDybkGOzqEu3CvbsA0aN

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 12 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Power Settings 1 TTPs 6 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Remote Services: SMB/Windows Admin Shares 1 TTPs 1 IoCs

    Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 12 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FoxOS v3.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\system32\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\FoxOS v3.bat" max
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\system32\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:4312
      • C:\Windows\system32\reg.exe
        reg add "HKLM\SYSTEM\CurrentControlSet\services\Dhcp" /v "Start" /t REG_DWORD /d "2" /f
        3⤵
          PID:4196
        • C:\Windows\regedit.exe
          regedit /s "7ZIP.reg"
          3⤵
          • Runs .reg file with regedit
          PID:1072
        • C:\Windows\system32\powercfg.exe
          powercfg -import "C:\Windows\APIs\Cat10IdleOn.pow" 69420228-6969-6969-6969-694202281337
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2904
        • C:\Windows\system32\powercfg.exe
          powercfg -import "C:\Windows\APIs\Cat10IdleOff.pow" 70420228-6969-6969-6969-694202281337
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:1116
        • C:\Windows\system32\powercfg.exe
          powercfg -setactive 69420228-6969-6969-6969-694202281337
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
        • C:\Windows\system32\powercfg.exe
          powercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
        • C:\Windows\system32\powercfg.exe
          powercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a
          3⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3248
        • C:\Windows\system32\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "StartColorMenu" /t REG_DWORD /d "4284394495" /f
          3⤵
            PID:2436
          • C:\Windows\system32\reg.exe
            reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentColorMenu" /t REG_DWORD /d "4286102015" /f
            3⤵
              PID:1788
            • C:\Windows\system32\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentPalette" /t REG_BINARY /d "FFE5CEFFFFD3ABFFFEC691FFFFB978FFFFAB5EFFFF9E44FFFE8C21FF88179800" /f
              3⤵
                PID:2352
              • C:\Windows\system32\reg.exe
                reg add "HKCU\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d "4286102015" /f
                3⤵
                  PID:2348
                • C:\Windows\system32\reg.exe
                  reg add "HKCU\Software\Microsoft\Windows\DWM" /v "ColorizationColor" /t REG_DWORD /d "3305093496" /f
                  3⤵
                    PID:3036
                  • C:\Windows\system32\reg.exe
                    reg add "HKCU\Software\Microsoft\Windows\DWM" /v "ColorizationAfterglow" /t REG_DWORD /d "3305093496" /f
                    3⤵
                      PID:360
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "StartColorMenu" /t REG_DWORD /d "4284394495" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:1856
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentColorMenu" /t REG_DWORD /d "4286102015" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:3780
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentPalette" /t REG_BINARY /d "FFE5CEFFFFD3ABFFFEC691FFFFB978FFFFAB5EFFFF9E44FFFE8C21FF88179800" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:752
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d "4286102015" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:4620
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "ColorizationColor" /t REG_DWORD /d "3305093496" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:2296
                    • C:\Windows\system32\reg.exe
                      reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "ColorizationAfterglow" /t REG_DWORD /d "3305093496" /f
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:3216
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl" /v "Win32PrioritySeparation" /t REG_DWORD /d "24" /f
                      3⤵
                        PID:4728
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc" /v "DependOnService" /t REG_MULTI_SZ /d "NSI\0RpcSs\0TcpIp" /f
                        3⤵
                          PID:1260
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\HotStart" /f
                          3⤵
                            PID:5088
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Sidebar" /f
                            3⤵
                              PID:1708
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Telephony" /f
                              3⤵
                                PID:2964
                              • C:\Windows\system32\reg.exe
                                reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Screensavers" /f
                                3⤵
                                  PID:4792
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKCU\Printers" /f
                                  3⤵
                                    PID:1040
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\SYSTEM\ControlSet001\Control\Print" /f
                                    3⤵
                                    • Boot or Logon Autostart Execution: Port Monitors
                                    • Boot or Logon Autostart Execution: Print Processors
                                    PID:812
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\SYSTEM\ControlSet002\Control\Print" /f
                                    3⤵
                                      PID:3752
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettings" /t REG_DWORD /d "1" /f
                                      3⤵
                                        PID:2816
                                      • C:\Windows\system32\reg.exe
                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverride" /t REG_DWORD /d "33554435" /f
                                        3⤵
                                          PID:4908
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverrideMask" /t REG_DWORD /d "3" /f
                                          3⤵
                                            PID:4840
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "EnableCfg" /t REG_DWORD /d "0" /f
                                            3⤵
                                              PID:4516
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "DisableExceptionChainValidation" /t REG_DWORD /d "1" /f
                                              3⤵
                                                PID:3828
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "KernelSEHOPEnabled" /t REG_DWORD /d "0" /f
                                                3⤵
                                                  PID:5092
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "DisableTsx" /t REG_DWORD /d "1" /f
                                                  3⤵
                                                    PID:2756
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "ProtectionMode" /t REG_DWORD /d "0" /f
                                                    3⤵
                                                      PID:544
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\Software\Microsoft\Ole\AppCompat" /v "RequireIntegrityActivationAuthenticationLevel" /t REG_DWORD /d "0" /f
                                                      3⤵
                                                        PID:2060
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell set-ProcessMitigation -System -Disable DEP, StrictHandle, SEHOP
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4884
                                                      • C:\Windows\system32\powercfg.exe
                                                        powercfg -h off
                                                        3⤵
                                                        • Power Settings
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3464
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Power" /v "HibernateEnabledDefault" /t REG_DWORD /d "0" /f
                                                        3⤵
                                                          PID:2120
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\Power" /v "EventProcessorEnabled" /t REG_DWORD /d "0" /f
                                                          3⤵
                                                            PID:1596
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /v "AwayModeEnabled" /t REG_DWORD /d "0" /f
                                                            3⤵
                                                              PID:1036
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                              3⤵
                                                                PID:1276
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                                3⤵
                                                                  PID:2828
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                                  3⤵
                                                                    PID:4932
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                                    3⤵
                                                                      PID:5104
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "WinStationsDisabled" /t REG_SZ /d "1" /f
                                                                      3⤵
                                                                        PID:3048
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v "disabledomaincreds" /t REG_DWORD /d "1" /f
                                                                        3⤵
                                                                          PID:2924
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v "restrictanonymous" /t REG_DWORD /d "1" /f
                                                                          3⤵
                                                                            PID:1272
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableLog" /t REG_DWORD /d "0" /f
                                                                            3⤵
                                                                              PID:1940
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableDpxLog" /t REG_DWORD /d "0" /f
                                                                              3⤵
                                                                                PID:3152
                                                                              • C:\Windows\system32\reg.exe
                                                                                reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableLog" /t REG_DWORD /d "0" /f
                                                                                3⤵
                                                                                  PID:3364
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableDpxLog" /t REG_DWORD /d "0" /f
                                                                                  3⤵
                                                                                    PID:3096
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\Microsoft\Ole" /v "EnableDCOM" /t REG_SZ /d "N" /f
                                                                                    3⤵
                                                                                      PID:2580
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Ole" /v "EnableDCOM" /t REG_SZ /d "N" /f
                                                                                      3⤵
                                                                                        PID:4748
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "EnableHIPM"| FINDSTR /V "EnableHIPM"
                                                                                        3⤵
                                                                                          PID:2740
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "EnableHIPM"
                                                                                            4⤵
                                                                                            • Maps connected drives based on registry
                                                                                            • Remote Services: SMB/Windows Admin Shares
                                                                                            PID:2792
                                                                                          • C:\Windows\system32\findstr.exe
                                                                                            FINDSTR /V "EnableHIPM"
                                                                                            4⤵
                                                                                              PID:3224

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ckjeuvhu.x1s.ps1

                                                                                        Filesize

                                                                                        60B

                                                                                        MD5

                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                        SHA1

                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                        SHA256

                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                        SHA512

                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                      • memory/4884-0-0x0000026EFB980000-0x0000026EFB9A2000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/4884-10-0x0000026EFBE60000-0x0000026EFBE7E000-memory.dmp

                                                                                        Filesize

                                                                                        120KB