Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.bat

Overview

General Information

Sample name:1.bat
Analysis ID:1560840
MD5:d8a72a9431d01f555ed3ed8806d16fd4
SHA1:b84a16cc240ec55e5c4d59f3b448261262ddd98c
SHA256:ead16c58358f83fa2f637ef0ffd426f133671f239d3faedad19fdaa5c4445c2a
Tags:batHUNuser-smica83
Infos:

Detection

CobaltStrike, MetasploitPSPayload
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Yara detected CobaltStrike
Yara detected Metasploit powershell Payload
Program does not show much activity (idle)
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 5016 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
No configs have been found
SourceRuleDescriptionAuthorStrings
1.batJoeSecurity_MetasploitPSPayloadYara detected Metasploit powershell PayloadJoe Security
    1.batJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
      1.batMsfpayloads_msf_3Metasploit Payloads - file msf.pshFlorian Roth
      • 0x2da:$s1: [DllImport("kernel32.dll")] public static extern int WaitForSingleObject(
      • 0x104:$s2: public enum MemoryProtection { ExecuteReadWrite = 0x40 }
      • 0x9ba:$s3: .func]::VirtualAlloc(0,
      • 0x9ef:$s4: .func+AllocationType]::Reserve -bOr [
      • 0x39f:$s5: New-Object System.CodeDom.Compiler.CompilerParameters
      • 0x3de:$s6: ReferencedAssemblies.AddRange(@("System.dll", [PsObject].Assembly.Location))
      • 0xb7:$s7: public enum AllocationType { Commit = 0x1000, Reserve = 0x2000 }
      • 0x149:$s9: public enum Time : uint { Infinite = 0xFFFFFFFF }
      • 0x4a5:$s10: = [System.Convert]::FromBase64String("/
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 1.batAvira: detected

      System Summary

      barindex
      Source: 1.bat, type: SAMPLEMatched rule: Metasploit Payloads - file msf.psh Author: Florian Roth
      Source: 1.bat, type: SAMPLEMatched rule: Msfpayloads_msf_3 date = 2017-02-09, hash1 = 335cfb85e11e7fb20cddc87e743b9e777dc4ab4e18a39c2a2da1aa61efdbd054, author = Florian Roth, description = Metasploit Payloads - file msf.psh, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: classification engineClassification label: mal72.troj.winBAT@2/0@0/0
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:980:120:WilError_03
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" "
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" "
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1.bat, type: SAMPLE
      Source: Yara matchFile source: 1.bat, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information1
      Scripting
      Valid AccountsWindows Management Instrumentation1
      Scripting
      1
      Process Injection
      1
      Process Injection
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      1.bat100%AviraTR/PSInject.G4
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1560840
      Start date and time:2024-11-22 11:57:07 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 30s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:2
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1.bat
      Detection:MAL
      Classification:mal72.troj.winBAT@2/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .bat
      • Stop behavior analysis, all processes terminated
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: 1.bat
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:ASCII text, with very long lines (1298), with CRLF line terminators
      Entropy (8bit):5.968799745994877
      TrID:
        File name:1.bat
        File size:3'084 bytes
        MD5:d8a72a9431d01f555ed3ed8806d16fd4
        SHA1:b84a16cc240ec55e5c4d59f3b448261262ddd98c
        SHA256:ead16c58358f83fa2f637ef0ffd426f133671f239d3faedad19fdaa5c4445c2a
        SHA512:33dbb16041a7d2b2904bb201d82b3e75d32d820299bd9e8a7a02bfe98a5c2e8d0e2c159be393ca96cc729d24235328d16a6470311f4defd4fbb65ee85c5e0199
        SSDEEP:48:AiaisCE+MTUEimb7qEa3/n1EL13YbGPE7d9Y4IQTEkCI6eeTt8P9LB2gHOGJOrP:N/sMGR0vn1+1R87MVuCI65A9LEgHPJsP
        TLSH:5051D735170AF78911862595DD27D8C5EE0FA2FA4AEEA2207A9CC255CD0ED1CD32623B
        File Content Preview:Set-StrictMode -Version 2....$eicar = ''....$DoIt = @'..$assembly = @"...using System;...using System.Runtime.InteropServices;...namespace inject {....public class func {.....[Flags] public enum AllocationType { Commit = 0x1000, Reserve = 0x2000 }.....[Fl
        Icon Hash:9686878b929a9886
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:05:57:59
        Start date:22/11/2024
        Path:C:\Windows\System32\cmd.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" "
        Imagebase:0x7ff69a290000
        File size:289'792 bytes
        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:1
        Start time:05:57:59
        Start date:22/11/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7699e0000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly