Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 18:53

General

  • Target

    rat.bat

  • Size

    110B

  • MD5

    fb5861fcad26ea1112c57fa081429279

  • SHA1

    3ee89eb0e963b470e14489dc54eac751250c3207

  • SHA256

    9cf43c9bb0ff2742ab02f2adc11a34b44ddc816320d17baf44d2944b1aa98117

  • SHA512

    f6e335a48e5bc6c7601b2546e3d2d3689e89f831d17f252a057e43b0f6b0d0c9c9a7f28221db78c077bcfb0750ac6ce14360dfc3322640e4ed3f97e91f1de297

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Deletes itself 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\rat.bat"
    1⤵
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\system32\takeown.exe
      takeown /f C:\ /r /d y
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:2108
    • C:\Windows\system32\icacls.exe
      icacls C:\ /grant administrators:F /t
      2⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads