Windows
Analysis Report
IOA.bat
Overview
General Information
Detection
Score: | 22 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Obfuscated command line found
Creates a process in suspended mode (likely to inject code)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Dosfuscation Activity
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
cmd.exe (PID: 6756 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\IOA.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) conhost.exe (PID: 6812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 5460 cmdline:
"cmd /c ec ho @echo o ff>temp.cm d&& echo s et KEY_NAM E=\"HKLM\\ SOFTWARE\\ Microsoft\ \DataTrans fer\\DataM anagementG ateway\\Co nfiguratio nManager\" >>temp.cmd && echo FO R /F ^\"us ebackq tok ens=1,2,*\ " ^A IN (` REG QUERY ^ /v Diacm dPath 2^^^ >nul ^^^| find ^\"Di acmdPath\" `) DO ( se t diacmdfi le=^C )>>t emp.cmd&& echo call :print ^\" ^\">>temp. cmd&& echo set destD ir=^\\Micr osoft\\Dat a Transfer \\DataMana gementGate way\\UserC onfigurati on\\>>temp .cmd&& ech o move ^\" diawp.exe. config\" ^ \"^\">>tem p.cmd&& ec ho move ^\ "diahost.e xe.config\ " ^\"^\">> temp.cmd&& echo goto :eof>>tem p.cmd&& ec ho :print> >temp.cmd& & echo set folder=^> >temp.cmd& & echo EXI T /B ^0>>t emp.cmd&& temp.cmd & & del temp .cmd", MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |