General
-
Target
Adil Windows test.bat
-
Size
12KB
-
Sample
241205-xe5cjswrd1
-
MD5
de58ceaf3e15b74f37ded57ca6a4b3db
-
SHA1
e1d566f0c71cd042c541a82cc0c2d5b734439429
-
SHA256
d6b89a4217578b742d1efd9c717ede6a302492842ed7afbe7d4fc45f16e790a5
-
SHA512
71c64af60a0180fb44dc53ef7bcf74ee3e29d30b6b0d4246bb8b9658be4bfe0fed2f153784dbf2ad93aaa459ca6b17e5c2324bbebb3b6e91ce2257ace5a0da64
-
SSDEEP
192:A9AcZIbMED95MxPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA6IQbwreO7D89T1rKNfBu
Static task
static1
Behavioral task
behavioral1
Sample
Adil Windows test.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Adil Windows test.bat
-
Size
12KB
-
MD5
de58ceaf3e15b74f37ded57ca6a4b3db
-
SHA1
e1d566f0c71cd042c541a82cc0c2d5b734439429
-
SHA256
d6b89a4217578b742d1efd9c717ede6a302492842ed7afbe7d4fc45f16e790a5
-
SHA512
71c64af60a0180fb44dc53ef7bcf74ee3e29d30b6b0d4246bb8b9658be4bfe0fed2f153784dbf2ad93aaa459ca6b17e5c2324bbebb3b6e91ce2257ace5a0da64
-
SSDEEP
192:A9AcZIbMED95MxPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA6IQbwreO7D89T1rKNfBu
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Query Registry
1System Information Discovery
1