General
-
Target
Adil Windows.bat
-
Size
11KB
-
Sample
241205-jbaf4svjew
-
MD5
bc1e97ccdf44d2a52480ef8f56daf32f
-
SHA1
4e7c69b2faec4a0b6e6e19329c0befa2cba99878
-
SHA256
69e0375efc3a5c96106dc5eaea7cf9c5ba1c451c3297304d709b4057abe6b862
-
SHA512
56d86c1399823f236f373cad1e7733fe52be0e96bd0c766a3e68e40720db00c0d1c67a7a86251e2d89b40d17fb11603185da80a94c8a1df645c144bf7979f94c
-
SSDEEP
192:A9Ac2bMED959MeO7D8HqwlfgvMo2NfcP7b8T0j:UA1QkMeO7D81U2NfBu
Static task
static1
Behavioral task
behavioral1
Sample
Adil Windows.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Adil Windows.bat
-
Size
11KB
-
MD5
bc1e97ccdf44d2a52480ef8f56daf32f
-
SHA1
4e7c69b2faec4a0b6e6e19329c0befa2cba99878
-
SHA256
69e0375efc3a5c96106dc5eaea7cf9c5ba1c451c3297304d709b4057abe6b862
-
SHA512
56d86c1399823f236f373cad1e7733fe52be0e96bd0c766a3e68e40720db00c0d1c67a7a86251e2d89b40d17fb11603185da80a94c8a1df645c144bf7979f94c
-
SSDEEP
192:A9Ac2bMED959MeO7D8HqwlfgvMo2NfcP7b8T0j:UA1QkMeO7D81U2NfBu
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Query Registry
1System Information Discovery
1