Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
exm.bat
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
exm.bat
Resource
win10v2004-20241007-en
asyncratstormkittyxwormdefaultdiscoveryevasionexecutionpersistenceprivilege_escalationratspywarestealertrojan
windows10-2004-x64
33 signatures
150 seconds
General
-
Target
exm.bat
-
Size
672KB
-
MD5
370aa4901be86e11a72afff222c86e92
-
SHA1
e096c9d5c9f569ce2ef635e85637770911e776ba
-
SHA256
93a217610764ba1fd4f3a6be92aee28d3ebb68bd97acac624d32eb5d74c66b83
-
SHA512
03ae1394b77920b8f3efa719bf0fda67863b320a5751e6a21100a26426a3519eb352f765c4ea079e9272f173980ec2b07b2ef48c61de21c0570a1956fb83eeb7
-
SSDEEP
3072:BIGzQbmbkAqA2xH7VkKEn14IZVvisLur+KW:BIGiVNEn14IZVvisL4W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
pid Process 1052 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1052 powershell.exe Token: SeIncreaseQuotaPrivilege 1668 WMIC.exe Token: SeSecurityPrivilege 1668 WMIC.exe Token: SeTakeOwnershipPrivilege 1668 WMIC.exe Token: SeLoadDriverPrivilege 1668 WMIC.exe Token: SeSystemProfilePrivilege 1668 WMIC.exe Token: SeSystemtimePrivilege 1668 WMIC.exe Token: SeProfSingleProcessPrivilege 1668 WMIC.exe Token: SeIncBasePriorityPrivilege 1668 WMIC.exe Token: SeCreatePagefilePrivilege 1668 WMIC.exe Token: SeBackupPrivilege 1668 WMIC.exe Token: SeRestorePrivilege 1668 WMIC.exe Token: SeShutdownPrivilege 1668 WMIC.exe Token: SeDebugPrivilege 1668 WMIC.exe Token: SeSystemEnvironmentPrivilege 1668 WMIC.exe Token: SeRemoteShutdownPrivilege 1668 WMIC.exe Token: SeUndockPrivilege 1668 WMIC.exe Token: SeManageVolumePrivilege 1668 WMIC.exe Token: 33 1668 WMIC.exe Token: 34 1668 WMIC.exe Token: 35 1668 WMIC.exe Token: SeIncreaseQuotaPrivilege 1668 WMIC.exe Token: SeSecurityPrivilege 1668 WMIC.exe Token: SeTakeOwnershipPrivilege 1668 WMIC.exe Token: SeLoadDriverPrivilege 1668 WMIC.exe Token: SeSystemProfilePrivilege 1668 WMIC.exe Token: SeSystemtimePrivilege 1668 WMIC.exe Token: SeProfSingleProcessPrivilege 1668 WMIC.exe Token: SeIncBasePriorityPrivilege 1668 WMIC.exe Token: SeCreatePagefilePrivilege 1668 WMIC.exe Token: SeBackupPrivilege 1668 WMIC.exe Token: SeRestorePrivilege 1668 WMIC.exe Token: SeShutdownPrivilege 1668 WMIC.exe Token: SeDebugPrivilege 1668 WMIC.exe Token: SeSystemEnvironmentPrivilege 1668 WMIC.exe Token: SeRemoteShutdownPrivilege 1668 WMIC.exe Token: SeUndockPrivilege 1668 WMIC.exe Token: SeManageVolumePrivilege 1668 WMIC.exe Token: 33 1668 WMIC.exe Token: 34 1668 WMIC.exe Token: 35 1668 WMIC.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2524 1732 cmd.exe 31 PID 1732 wrote to memory of 2524 1732 cmd.exe 31 PID 1732 wrote to memory of 2524 1732 cmd.exe 31 PID 1732 wrote to memory of 2508 1732 cmd.exe 32 PID 1732 wrote to memory of 2508 1732 cmd.exe 32 PID 1732 wrote to memory of 2508 1732 cmd.exe 32 PID 1732 wrote to memory of 656 1732 cmd.exe 33 PID 1732 wrote to memory of 656 1732 cmd.exe 33 PID 1732 wrote to memory of 656 1732 cmd.exe 33 PID 1732 wrote to memory of 1052 1732 cmd.exe 34 PID 1732 wrote to memory of 1052 1732 cmd.exe 34 PID 1732 wrote to memory of 1052 1732 cmd.exe 34 PID 1732 wrote to memory of 2820 1732 cmd.exe 37 PID 1732 wrote to memory of 2820 1732 cmd.exe 37 PID 1732 wrote to memory of 2820 1732 cmd.exe 37 PID 1732 wrote to memory of 2744 1732 cmd.exe 38 PID 1732 wrote to memory of 2744 1732 cmd.exe 38 PID 1732 wrote to memory of 2744 1732 cmd.exe 38 PID 1732 wrote to memory of 2620 1732 cmd.exe 39 PID 1732 wrote to memory of 2620 1732 cmd.exe 39 PID 1732 wrote to memory of 2620 1732 cmd.exe 39 PID 2620 wrote to memory of 1668 2620 cmd.exe 40 PID 2620 wrote to memory of 1668 2620 cmd.exe 40 PID 2620 wrote to memory of 1668 2620 cmd.exe 40 PID 2620 wrote to memory of 2796 2620 cmd.exe 41 PID 2620 wrote to memory of 2796 2620 cmd.exe 41 PID 2620 wrote to memory of 2796 2620 cmd.exe 41 PID 1732 wrote to memory of 2840 1732 cmd.exe 42 PID 1732 wrote to memory of 2840 1732 cmd.exe 42 PID 1732 wrote to memory of 2840 1732 cmd.exe 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\exm.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:2524
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:2508
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\system32\reg.exeReg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- UAC bypass
PID:2820
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:2744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_UserAccount where name="Admin" get sid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\system32\findstr.exefindstr "S-"3⤵PID:2796
-
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2840
-