Analysis

  • max time kernel
    109s
  • max time network
    127s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    12-12-2024 17:50

General

  • Target

    PERM 11-12-2024/Serial Checker.bat

  • Size

    1KB

  • MD5

    c6b62b1ffcd5a9cade299e6a9458fd09

  • SHA1

    8fbca3f3dab7aa83c19a284ffd0e168313768963

  • SHA256

    cd8eb671af25c123a24436878e375df9b12e2465500d8f3fe20bcd51c2969de4

  • SHA512

    27b789862c56103753af9860299fb01d76579b0983d6d0617671401a2d50dc4d4ed224c26360a660680b3f1bf3252c3de41cc088c359b851102b0da53b8efae9

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PERM 11-12-2024\Serial Checker.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
      2⤵
        PID:4204
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic baseboard get product,Manufacturer,serialnumber
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:236
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get manufacturer,serialnumber,version,smbiosbiosversion,releasedate
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get name,identifyingnumber,uuid
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:336
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic memorychip get partnumber, serialnumber, sku
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2132
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nic get macaddress, description
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2536
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic cpu get caption, processorid, socketdesignation, Name, Caption
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3660
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic logicaldisk where drivetype=3 get name,volumeserialnumber
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4092
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic diskdrive get Model, SerialNumber, name
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2704
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic OS GET Caption,SerialNumber,CSName
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1016
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic computersystem get PrimaryOwnerName
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -Command "Write-Host 'SHA256: ' -NoNewline; Write-Host (Get-TpmEndorsementKeyInfo -Hash Sha256).PublicKeyHash"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:4020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aohx5esx.opo.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/4020-0-0x0000026136560000-0x0000026136582000-memory.dmp

      Filesize

      136KB