Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 23:56
Behavioral task
behavioral1
Sample
Basic Nigga shit.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
OpenPort47070.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
OpenPort4782.bat
Resource
win10v2004-20241007-en
General
-
Target
OpenPort4782.bat
-
Size
578B
-
MD5
6bf40b3e2356b26bd4cb6dc373ccfbbc
-
SHA1
fc3999705f0e5966629acab92c5ee8e106ee4353
-
SHA256
ea764ca9b6ebebdc2b7d904438632a3bb9474fa4413b0da7454ad544796f2db9
-
SHA512
35486de07e0ba8757d9237489488427ebd9f2d934f6132709f340ca5316312aa7aaed0581e7c4c89bb50693a1a6c15fbbf33d4088367b16ea9d97a0051e6d7a9
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1580 netsh.exe 3688 netsh.exe -
pid Process 4896 powershell.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4896 powershell.exe 4896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4896 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1996 wrote to memory of 4896 1996 cmd.exe 84 PID 1996 wrote to memory of 4896 1996 cmd.exe 84 PID 4896 wrote to memory of 3144 4896 powershell.exe 85 PID 4896 wrote to memory of 3144 4896 powershell.exe 85 PID 3144 wrote to memory of 1580 3144 cmd.exe 87 PID 3144 wrote to memory of 1580 3144 cmd.exe 87 PID 3144 wrote to memory of 3688 3144 cmd.exe 88 PID 3144 wrote to memory of 3688 3144 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -Verb RunAs -FilePath 'C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat' -ArgumentList 'am_admin'"2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OpenPort4782.bat" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall show rule name="Open Port 4782"4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1580
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Open Port 4782" dir=in action=allow protocol=TCP localport=47824⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82