Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fake!Virus!HarmlessAHAHHA.bat

Overview

General Information

Sample name:Fake!Virus!HarmlessAHAHHA.bat
Analysis ID:1562384
MD5:02e182ff2335b09c3fb195d3ca900217
SHA1:d58cb1be5233f97fdec08d8302fb74529f2acba3
SHA256:cc9ff758865bd6167a5cf7c5a40f7d6cf5406707155a45c72877c2d4322b281b
Tags:batcia-tfuser-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • cmd.exe (PID: 1912 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Fake!Virus!HarmlessAHAHHA.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mode.com (PID: 6064 cmdline: mode con: cols=80 lines=25 MD5: BEA7464830980BF7C0490307DB4FC875)
    • PING.EXE (PID: 1488 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 6336 cmdline: ping -n 3 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 6436 cmdline: ping -n 4 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 2604 cmdline: ping -n 5 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 2552 cmdline: ping -n 3 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 1816 cmdline: ping -n 4 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 2144 cmdline: ping -n 5 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 3124 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 2012 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 3352 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 3576 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
    • PING.EXE (PID: 3972 cmdline: ping -n 2 127.0.0.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessCsp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessGuard.exeJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\assignedaccessmanagersvc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\aspnet_counters.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\asferror.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessManager.dllJump to behavior

Networking

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeFile deleted: C:\Windows\System32\LogFiles\WMI\Diagtrack-Listener.etl.006Jump to behavior
Source: classification engineClassification label: mal48.troj.evad.winBAT@28/13@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:652:120:WilError_03
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Fake!Virus!HarmlessAHAHHA.bat" "
Source: C:\Windows\System32\mode.comKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Fake!Virus!HarmlessAHAHHA.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode con: cols=80 lines=25
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode con: cols=80 lines=25Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: ureg.dllJump to behavior
Source: C:\Windows\System32\mode.comSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\msftedit.dllJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 459Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessCsp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessGuard.exeJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\assignedaccessmanagersvc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\aspnet_counters.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\asferror.dllJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: C:\Windows\System32\AssignedAccessManager.dllJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mode.com mode con: cols=80 lines=25Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 3 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 4 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 5 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.0.0.1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
11
Process Injection
11
Process Injection
OS Credential Dumping1
Application Window Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
File Deletion
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Network Configuration Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1562384 Sample: Fake!Virus!HarmlessAHAHHA.bat Startdate: 25/11/2024 Architecture: WINDOWS Score: 48 5 cmd.exe 1 2->5         started        signatures3 19 Uses ping.exe to sleep 5->19 21 Uses ping.exe to check the status of other devices and networks 5->21 8 PING.EXE 1 5->8         started        11 conhost.exe 5->11         started        13 PING.EXE 1 5->13         started        15 11 other processes 5->15 process4 dnsIp5 17 127.0.0.1 unknown unknown 8->17

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Fake!Virus!HarmlessAHAHHA.bat0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
IP
127.0.0.1
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562384
Start date and time:2024-11-25 14:59:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 30s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:19
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Fake!Virus!HarmlessAHAHHA.bat
Detection:MAL
Classification:mal48.troj.evad.winBAT@28/13@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .bat
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenFile calls found.
  • VT rate limit hit for: Fake!Virus!HarmlessAHAHHA.bat
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\PING.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):331
Entropy (8bit):4.92149009030101
Encrypted:false
SSDEEP:6:PzLSLzMRfmWxHLThx2LThx0sW26VY7FwAFeMmvVOIHJFxMVlmJHaVFEG1vv:PKMRJpTeT0sBSAFSkIrxMVlmJHaVzvv
MD5:2E512EE24AAB186D09E9A1F9B72A0569
SHA1:C5BA2E0C0338FFEE13ED1FB6DA0CC9C000824B0B
SHA-256:DB41050CA723A06D95B73FFBE40B32DE941F5EE474F129B2B33E91C67B72674F
SHA-512:6B4487A088155E34FE5C642E1C3D46F63CB2DDD9E4092809CE6F3BEEFDEF0D1F8AA67F8E733EDE70B07F467ED5BB6F07104EEA4C1E7AC7E1A502A772F56F7DE9
Malicious:false
Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
File type:DOS batch file, ASCII text, with CRLF line terminators
Entropy (8bit):4.828341641653711
TrID:
    File name:Fake!Virus!HarmlessAHAHHA.bat
    File size:1'035 bytes
    MD5:02e182ff2335b09c3fb195d3ca900217
    SHA1:d58cb1be5233f97fdec08d8302fb74529f2acba3
    SHA256:cc9ff758865bd6167a5cf7c5a40f7d6cf5406707155a45c72877c2d4322b281b
    SHA512:ceb4ce0d8554f336f19057e6f2e560ebad945c89be5caf6bb4d0479492755b5869eed8766b12365dfd5a33606beec248f3e0841189238d8b546444a2f9224c03
    SSDEEP:24:5Bet8c99OvG2Y4f8R6+stZ8qdjM2UaRYRnY/l:5Ba8c99Ovg/6+stDdjMpaRIgl
    TLSH:93113DFF3924A1E5E1DB4B545C3BA130F9A5F06B0F051D02C87356BA967CAD2373A486
    File Content Preview:@echo off..color 0a..mode con: cols=80 lines=25..echo...echo Initializing Virus Simulation.....ping -n 2 127.0.0.1 > nul..echo...echo Connecting to central command server.....ping -n 3 127.0.0.1 > nul..echo Connection established...echo...echo Downloading
    Icon Hash:9686878b929a9886
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:1
    Start time:09:00:17
    Start date:25/11/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Fake!Virus!HarmlessAHAHHA.bat" "
    Imagebase:0x7ff706290000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:09:00:17
    Start date:25/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff70f010000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:3
    Start time:09:00:17
    Start date:25/11/2024
    Path:C:\Windows\System32\mode.com
    Wow64 process (32bit):false
    Commandline:mode con: cols=80 lines=25
    Imagebase:0x7ff724c20000
    File size:33'280 bytes
    MD5 hash:BEA7464830980BF7C0490307DB4FC875
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:4
    Start time:09:00:17
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:09:00:19
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 3 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:09:00:21
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 4 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:09:00:24
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 5 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:09:00:28
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 3 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:09:00:30
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 4 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:09:00:33
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 5 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:09:00:37
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:13
    Start time:09:00:38
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:14
    Start time:09:00:40
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:09:00:41
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:09:00:42
    Start date:25/11/2024
    Path:C:\Windows\System32\PING.EXE
    Wow64 process (32bit):false
    Commandline:ping -n 2 127.0.0.1
    Imagebase:0x7ff72aea0000
    File size:22'528 bytes
    MD5 hash:2F46799D79D22AC72C241EC0322B011D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    No disassembly