MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a83a44720d94be24a8e7745d6871d65afda849c4008ab72511dd5ac38c7378c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 7a83a44720d94be24a8e7745d6871d65afda849c4008ab72511dd5ac38c7378c
SHA3-384 hash: acee78bfb61d0f88ab56849034d7e3745ccb738ebd58c2b49461b481730a52d0ee664099479e9f4534f932c20cae5ea0
SHA1 hash: 4861be8ba1ba6d567f9950390f290bb8b860ccae
MD5 hash: 64d17cf4e56c0fdc93365eb17914ce39
humanhash: florida-three-yankee-kilo
File name:1 (2).cmd
Download: download sample
File size:5'285'337 bytes
First seen:2024-10-03 12:23:33 UTC
Last seen:Never
File type:cmd cmd
MIME type:text/x-msdos-batch
ssdeep 49152:SW2HHBORwlR4IStoWhlWSPH4HCIhUm9wfE+0yd8aWacLhMrdOe8f8:9
Threatray 824 similar samples on MalwareBazaar
TLSH T1F036F11F22C7EA3B0A710A487875127FB79C0DCCA427688E1D7467F963BD7E81616368
Magika batch
Reporter JAMESWT_WT
Tags:azure-winsecure-com cmd

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
Powershell Vmdetect Emotet Gumen
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm cmd lolbin masquerade wmic
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suricata IDS alerts for network traffic
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524984 Sample: 1 (2).cmd Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 81 azure-winsecure.com 2->81 83 ipwho.is 2->83 93 Suricata IDS alerts for network traffic 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 .NET source code references suspicious native API functions 2->97 99 14 other signatures 2->99 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 129 Suspicious powershell command line found 13->129 131 Suspicious command line found 13->131 18 powershell.exe 33 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 133 Writes to foreign memory regions 16->133 135 Modifies the context of a thread in another process (thread injection) 16->135 137 Injects a PE file into a foreign processes 16->137 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 79 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->79 dropped 101 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->101 103 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 18->105 113 4 other signatures 18->113 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        107 Injects code into the Windows Explorer (explorer.exe) 26->107 109 Contains functionality to inject code into remote processes 26->109 111 Writes to foreign memory regions 26->111 115 3 other signatures 26->115 37 winlogon.exe 26->37 injected 39 lsass.exe 26->39 injected 41 svchost.exe 26->41 injected 43 17 other processes 26->43 signatures8 process9 signatures10 89 Suspicious powershell command line found 32->89 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        process11 process12 51 cmd.exe 1 45->51         started        signatures13 117 Suspicious powershell command line found 51->117 119 Suspicious command line found 51->119 54 powershell.exe 51->54         started        58 WMIC.exe 1 51->58         started        60 WMIC.exe 1 51->60         started        62 4 other processes 51->62 process14 dnsIp15 85 azure-winsecure.com 154.216.20.132, 63301, 6969 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 54->85 87 ipwho.is 195.201.57.90, 443, 63304 HETZNER-ASDE Germany 54->87 121 Creates autostart registry keys with suspicious values (likely registry only malware) 54->121 123 Creates autostart registry keys with suspicious names 54->123 125 Creates an autostart registry key pointing to binary in C:\Windows 54->125 127 6 other signatures 54->127 64 powershell.exe 54->64         started        67 schtasks.exe 54->67         started        69 WerFault.exe 54->69         started        71 WerFault.exe 54->71         started        signatures16 process17 signatures18 91 Injects a PE file into a foreign processes 64->91 73 conhost.exe 64->73         started        75 powershell.exe 64->75         started        77 conhost.exe 67->77         started        process19
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Warp
Author:Seth Hardy
Description:Warp
Rule name:WarpStrings
Author:Seth Hardy
Description:Warp Identifying Strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments