Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 19:56

General

  • Target

    AncelsPerformanceBatch.bat

  • Size

    165KB

  • MD5

    95e5072c5582d546e2bd42eee4642376

  • SHA1

    e920b5930456311885ed1506d2b6eee76d745bf1

  • SHA256

    a1af1cebcb9b024f05690fd07e65a7363e3bc0395cfc788102e9a907e76dda03

  • SHA512

    597caafd90f4ac9177bd9de3fe3523b2a8711596b93d9eb1e0a97efc08dad8033772040c35471b6ebd74d992676da485c7542776c2f062a2bdbad234aea2ee7d

  • SSDEEP

    1536:dl2cSlFWJQlpTUgIafq+2RSM88xck4YaXv5n1kwM+ZA:7aNJ4cFuL

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\AncelsPerformanceBatch.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell "Set-ExecutionPolicy Unrestricted"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Windows\system32\reg.exe
      reg add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
      2⤵
        PID:1664
      • C:\Windows\system32\reg.exe
        reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d "0" /f
        2⤵
          PID:2240
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Bypass -Command "Checkpoint-Computer -Description 'Ancels Performance Batch' -RestorePointType 'MODIFY_SETTINGS'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
          2⤵
          • UAC bypass
          PID:1672
        • C:\Windows\system32\timeout.exe
          timeout /t 3 /nobreak
          2⤵
          • Delays execution with timeout.exe
          PID:2908
        • C:\Windows\system32\cacls.exe
          "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
          2⤵
            PID:3028
          • C:\Windows\system32\chcp.com
            chcp 65001
            2⤵
              PID:2616
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3008
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C8" "0000000000000060"
            1⤵
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2980

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0Q2AN3R6N684W3KRYRFI.temp

            Filesize

            7KB

            MD5

            ecf35c98230fc601f3d4f203917d5ce8

            SHA1

            871dd6bbc9f31d2c63363dfba66869796eb54357

            SHA256

            566c4095c17707c011fa1d12393230d738c111e4475e2bdf33bac6f8e082da99

            SHA512

            f9d79edd015f8519c6180336c75e168522eb67d2becf216cf390fef730c2437821be37ae0c07f999a1682659f21a8f64543b9e8962b6e5e6bdcccb22a20c3fa5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            da68a9f62eb6c97b2a028c28aa0360c7

            SHA1

            ebb78b5e180a4d1e4a580b3f2bb3d24743fd6416

            SHA256

            95a5ec83a68be208378f4716ffe6fe368e62c0b49c3b6af5c2454a637b9985ca

            SHA512

            41adb4ad1c086c2ff771882741e89bf04a976d101ea4fb243912ea3cc521e77a869797cb3e64507c36eaf7efdf90677455d153591f04bdbac65ba2672491756a

          • memory/2244-4-0x000007FEF64CE000-0x000007FEF64CF000-memory.dmp

            Filesize

            4KB

          • memory/2244-5-0x000000001B7C0000-0x000000001BAA2000-memory.dmp

            Filesize

            2.9MB

          • memory/2244-6-0x00000000022C0000-0x00000000022C8000-memory.dmp

            Filesize

            32KB

          • memory/2244-8-0x0000000002C3B000-0x0000000002CA2000-memory.dmp

            Filesize

            412KB

          • memory/2244-7-0x0000000002C34000-0x0000000002C37000-memory.dmp

            Filesize

            12KB

          • memory/2244-11-0x000007FEF6210000-0x000007FEF6BAD000-memory.dmp

            Filesize

            9.6MB

          • memory/2260-18-0x000000001B710000-0x000000001B9F2000-memory.dmp

            Filesize

            2.9MB

          • memory/2260-19-0x0000000002790000-0x0000000002798000-memory.dmp

            Filesize

            32KB