General
-
Target
Startup-script.bat
-
Size
98KB
-
Sample
241130-ypr1mstkfv
-
MD5
8eb4e23e8bfed1be98837c83b8bd01d6
-
SHA1
a406d12d11002bd87314f6a9edc84bb30c532db7
-
SHA256
a9f9df39909cc07f30ed4e60b0c6024e95c05d4d062c48d15459cf98d52d80c3
-
SHA512
31d2e0390afe06e9668ff9ce2f517b1b656414b9655d4777c1700ded5b954810a969988c9c2c2409b304f1a588a4820471be224bf084edeaa95cb0f8c6a7648b
-
SSDEEP
768:OPWVQjLJcQMmrdtXuMuxgFBSHDTFs+umRs4fPmwN1o76ba4COljXx5xYa0MF9PVL:uQMuxqSjX/v
Static task
static1
Behavioral task
behavioral1
Sample
Startup-script.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Startup-script.bat
-
Size
98KB
-
MD5
8eb4e23e8bfed1be98837c83b8bd01d6
-
SHA1
a406d12d11002bd87314f6a9edc84bb30c532db7
-
SHA256
a9f9df39909cc07f30ed4e60b0c6024e95c05d4d062c48d15459cf98d52d80c3
-
SHA512
31d2e0390afe06e9668ff9ce2f517b1b656414b9655d4777c1700ded5b954810a969988c9c2c2409b304f1a588a4820471be224bf084edeaa95cb0f8c6a7648b
-
SSDEEP
768:OPWVQjLJcQMmrdtXuMuxgFBSHDTFs+umRs4fPmwN1o76ba4COljXx5xYa0MF9PVL:uQMuxqSjX/v
-
Modifies boot configuration data using bcdedit
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1