Analysis

  • max time kernel
    0s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 23:20

General

  • Target

    zapret-discord-youtube-main/check_updates.bat

  • Size

    1KB

  • MD5

    8ea8e2f841c62cb8a800e0ecb601850f

  • SHA1

    fd456492a252ec263ed828ccb90935d4df5c9cb6

  • SHA256

    d9e6be50f0960b1c38ed7771e710f1af359b53fe1390e7dc8524438ea3885585

  • SHA512

    a5379aa37a1a04ac60d24a085abb2eddfaa97d511141b0764f34d86e67b3462ad627f4585dded8477676c228418a34e3f986147d6f43277caed526a0a554cc77

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Powershell Invoke Web Request.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\zapret-discord-youtube-main\check_updates.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\system32\chcp.com
      chcp 437
      2⤵
        PID:1772
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -command "(Invoke-WebRequest -Uri \"https://raw.githubusercontent.com/Flowseal/zapret-discord-youtube/main/.service/version.txt\" -Headers @{\"Cache-Control\"=\"no-cache\"} -TimeoutSec 5).Content.Trim()" 2>nul
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5648
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -command "(Invoke-WebRequest -Uri \"https://raw.githubusercontent.com/Flowseal/zapret-discord-youtube/main/.service/version.txt\" -Headers @{\"Cache-Control\"=\"no-cache\"} -TimeoutSec 5).Content.Trim()"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pdswlkwy.2jk.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2356-0-0x00007FF835CB3000-0x00007FF835CB5000-memory.dmp

      Filesize

      8KB

    • memory/2356-1-0x000002BA711D0000-0x000002BA711F2000-memory.dmp

      Filesize

      136KB

    • memory/2356-11-0x00007FF835CB0000-0x00007FF836771000-memory.dmp

      Filesize

      10.8MB

    • memory/2356-12-0x00007FF835CB0000-0x00007FF836771000-memory.dmp

      Filesize

      10.8MB

    • memory/2356-13-0x000002BA71F50000-0x000002BA726F6000-memory.dmp

      Filesize

      7.6MB

    • memory/2356-17-0x00007FF835CB0000-0x00007FF836771000-memory.dmp

      Filesize

      10.8MB