MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: e96f8f61e3af77c429ae6af54c128f7b8420a45a0a63bdfcacd682773b8e5fc1
SHA3-384 hash: 0b4c764dbf10ce0ed274ede1e2df0bae8195c7b732e34d4fd4447afe10a66a686964178699c82a6d56d5532cc427f8a9
SHA1 hash: 8876cd520507cbfdc2e89e449baba52232a1df1b
MD5 hash: 19fc666f7494d78a55d6b50a0252c214
humanhash: nebraska-potato-king-one
File name:payload.cmd
Download: download sample
File size:5'214'429 bytes
First seen:2024-10-03 12:23:56 UTC
Last seen:2024-10-04 18:53:57 UTC
File type:cmd cmd
MIME type:text/x-msdos-batch
ssdeep 49152:9YFeyNRX+o9UIcbBIXu/DloMIZv/us2aFGKeXGuqzwIEqHL5l8M/CJs2:f
Threatray 826 similar samples on MalwareBazaar
TLSH T18536120B1D54ECBECDA50DAEE95A2F0FF432BE57F02909B6611B05BD07781E104D9A3A
Magika powershell
Reporter JAMESWT_WT
Tags:azure-winsecure-com cmd

Intelligence


File Origin
# of uploads :
2
# of downloads :
73
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
Powershell Emotet Gumen
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd lolbin masquerade wmic
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suricata IDS alerts for network traffic
Suspicious command line found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524983 Sample: payload.cmd Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 81 azure-winsecure.com 2->81 83 ipwho.is 2->83 95 Suricata IDS alerts for network traffic 2->95 97 Malicious sample detected (through community Yara rule) 2->97 99 .NET source code references suspicious native API functions 2->99 101 14 other signatures 2->101 13 cmd.exe 1 2->13         started        16 powershell.exe 2->16         started        signatures3 process4 signatures5 131 Suspicious powershell command line found 13->131 133 Suspicious command line found 13->133 18 powershell.exe 33 13->18         started        22 WMIC.exe 1 13->22         started        24 WMIC.exe 1 13->24         started        30 4 other processes 13->30 135 Writes to foreign memory regions 16->135 137 Modifies the context of a thread in another process (thread injection) 16->137 139 Injects a PE file into a foreign processes 16->139 26 dllhost.exe 16->26         started        28 conhost.exe 16->28         started        process6 file7 79 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 18->79 dropped 103 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->103 105 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->105 107 Uses schtasks.exe or at.exe to add and modify task schedules 18->107 115 4 other signatures 18->115 32 cmd.exe 1 18->32         started        35 WerFault.exe 20 16 18->35         started        109 Injects code into the Windows Explorer (explorer.exe) 26->109 111 Contains functionality to inject code into remote processes 26->111 113 Writes to foreign memory regions 26->113 117 3 other signatures 26->117 37 lsass.exe 26->37 injected 39 winlogon.exe 26->39 injected 41 svchost.exe 26->41 injected 43 16 other processes 26->43 signatures8 process9 signatures10 89 Suspicious powershell command line found 32->89 45 powershell.exe 32->45         started        47 conhost.exe 32->47         started        49 cmd.exe 1 32->49         started        91 Writes to foreign memory regions 37->91 process11 process12 51 cmd.exe 1 45->51         started        signatures13 119 Suspicious powershell command line found 51->119 121 Suspicious command line found 51->121 54 powershell.exe 51->54         started        58 WMIC.exe 1 51->58         started        60 WMIC.exe 1 51->60         started        62 4 other processes 51->62 process14 dnsIp15 85 azure-winsecure.com 154.216.20.132, 49719, 6969 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 54->85 87 ipwho.is 195.201.57.90, 443, 49720 HETZNER-ASDE Germany 54->87 123 Creates autostart registry keys with suspicious values (likely registry only malware) 54->123 125 Creates autostart registry keys with suspicious names 54->125 127 Creates an autostart registry key pointing to binary in C:\Windows 54->127 129 6 other signatures 54->129 64 powershell.exe 54->64         started        67 schtasks.exe 54->67         started        69 WerFault.exe 54->69         started        71 WerFault.exe 54->71         started        signatures16 process17 signatures18 93 Injects a PE file into a foreign processes 64->93 73 conhost.exe 64->73         started        75 powershell.exe 64->75         started        77 conhost.exe 67->77         started        process19
Threat name:
Script-BAT.Trojan.AntiSandbox
Status:
Malicious
First seen:
2024-10-02 06:36:25 UTC
File Type:
Text (PowerShell)
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Warp
Author:Seth Hardy
Description:Warp
Rule name:WarpStrings
Author:Seth Hardy
Description:Warp Identifying Strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments