Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 00:53

General

  • Target

    perm/serials/SerialsChecker.bat

  • Size

    534B

  • MD5

    24e3d5bcc9303227287318776960b7a2

  • SHA1

    5c66afdccf6ac0f84a5ba218d4fbea8d5975b5c7

  • SHA256

    28d007fe953bc08f5e41a5c1a25f9e0436bf3420ef788fcb7e8c9293badb9d42

  • SHA512

    2998f2cd8349b94d538b0a69ebe04fd2288a2c0484e95ba90dcebf422eb012d0899cc0bf54ad9747e9d7d0d2909bb659a5fc6ecc4d602281be5384aaf3327033

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\perm\serials\SerialsChecker.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic bios get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5096
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3300
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get serialnumber
      2⤵
        PID:1452
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic baseboard get serialnumber
        2⤵
          PID:3412
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic baseboard get manufacturer
          2⤵
            PID:4208
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress
            2⤵
              PID:2472

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads