General
-
Target
Adil Windows.bat
-
Size
12KB
-
Sample
241205-xqftbstmhr
-
MD5
cb107d44ed312ae167260b86b9d1901d
-
SHA1
47406774f65842ff020290fe34c0175789e2f5d0
-
SHA256
ae5c64a88ceb35a4cd3748ed27392845405934108bcefff1c965599ba1294f30
-
SHA512
981f373ec1ff38b4bba875ef8bb5caa5875082c8c6e8f36f8a4593599500195536b522853d686499f6b3908b7845e283b695f9ac370201ffdf319a5ec1a563fd
-
SSDEEP
192:A9AcZ8zMED95ExPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA684zwreO7D89T1rKNfBu
Static task
static1
Behavioral task
behavioral1
Sample
Adil Windows.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Adil Windows.bat
-
Size
12KB
-
MD5
cb107d44ed312ae167260b86b9d1901d
-
SHA1
47406774f65842ff020290fe34c0175789e2f5d0
-
SHA256
ae5c64a88ceb35a4cd3748ed27392845405934108bcefff1c965599ba1294f30
-
SHA512
981f373ec1ff38b4bba875ef8bb5caa5875082c8c6e8f36f8a4593599500195536b522853d686499f6b3908b7845e283b695f9ac370201ffdf319a5ec1a563fd
-
SSDEEP
192:A9AcZ8zMED95ExPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA684zwreO7D89T1rKNfBu
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Allows Network login with blank passwords
Allows local user accounts with blank passwords to access device from the network.
-
Hijack Execution Flow: Executable Installer File Permissions Weakness
Possible Turn off User Account Control's privilege elevation for standard users.
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Remote Services: SMB/Windows Admin Shares
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1Executable Installer File Permissions Weakness
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Discovery
Password Policy Discovery
1Peripheral Device Discovery
1Query Registry
1System Information Discovery
1