Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 08:58

General

  • Target

    $_57_/bn.bat

  • Size

    885B

  • MD5

    b8f5f8991353b53c34e6909eced64f13

  • SHA1

    5e039faaf0125202fec8087475c62248de7a3976

  • SHA256

    f9b7a1395cd60cf2c03bc5b48c81742a6e2a9fc5f5d14dfb48232678c83f272e

  • SHA512

    4e5b61f09a6672e4fd93ebccfc8ef25139db6e5200a8203b3950a68cb3251316aef30f86facc1f7560a7f1215647d63cdae0b0fd5ae094097ed180856206ef70

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\$_57_\bn.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4544
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1152
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3496
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:216
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1156
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:232
    • C:\Users\Admin\AppData\Local\Temp\$_57_\SetACL64.exe
      SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads