General
-
Target
Adil Windows - Copy.bat
-
Size
12KB
-
Sample
241205-h5b2cszpaq
-
MD5
2a7086b99fea895c2f2ed23abe77c93c
-
SHA1
54c39b64f373be5a397e67c10bb17259b6aa7595
-
SHA256
37705c3cda6ed05001d551d5bd262fbf3163d11338e0c2179ba1db231a7e07f6
-
SHA512
ebd731316d435edad6ec6b5cde0b5b44166e74e518dc1efc586c733f58a96da4561eb8daa7785107e6c4343c9a44b5db230b0bacf7797afed806e28c15db0c14
-
SSDEEP
192:AAAcaDMED9DPGeO7D8HqRvfgvpoVN3cP7b8T0zN:zAfoMGeO7D8YjVN3BIN
Static task
static1
Behavioral task
behavioral1
Sample
Adil Windows - Copy.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Adil Windows - Copy.bat
-
Size
12KB
-
MD5
2a7086b99fea895c2f2ed23abe77c93c
-
SHA1
54c39b64f373be5a397e67c10bb17259b6aa7595
-
SHA256
37705c3cda6ed05001d551d5bd262fbf3163d11338e0c2179ba1db231a7e07f6
-
SHA512
ebd731316d435edad6ec6b5cde0b5b44166e74e518dc1efc586c733f58a96da4561eb8daa7785107e6c4343c9a44b5db230b0bacf7797afed806e28c15db0c14
-
SSDEEP
192:AAAcaDMED9DPGeO7D8HqRvfgvpoVN3cP7b8T0zN:zAfoMGeO7D8YjVN3BIN
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Query Registry
1System Information Discovery
1