Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 23:56

General

  • Target

    OpenPort4782.bat

  • Size

    578B

  • MD5

    6bf40b3e2356b26bd4cb6dc373ccfbbc

  • SHA1

    fc3999705f0e5966629acab92c5ee8e106ee4353

  • SHA256

    ea764ca9b6ebebdc2b7d904438632a3bb9474fa4413b0da7454ad544796f2db9

  • SHA512

    35486de07e0ba8757d9237489488427ebd9f2d934f6132709f340ca5316312aa7aaed0581e7c4c89bb50693a1a6c15fbbf33d4088367b16ea9d97a0051e6d7a9

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process -Verb RunAs -FilePath 'C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat' -ArgumentList 'am_admin'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat" am_admin
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall show rule name="Open Port 4782"
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:1580
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="Open Port 4782" dir=in action=allow protocol=TCP localport=4782
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:3688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vv5ty3bp.lt4.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4896-0-0x00007FFF759D3000-0x00007FFF759D5000-memory.dmp

    Filesize

    8KB

  • memory/4896-7-0x00000193A7EC0000-0x00000193A7EE2000-memory.dmp

    Filesize

    136KB

  • memory/4896-11-0x00007FFF759D0000-0x00007FFF76491000-memory.dmp

    Filesize

    10.8MB

  • memory/4896-12-0x00007FFF759D0000-0x00007FFF76491000-memory.dmp

    Filesize

    10.8MB

  • memory/4896-15-0x00007FFF759D0000-0x00007FFF76491000-memory.dmp

    Filesize

    10.8MB