IOC Report
Installer.bat

loading gif

Files

File Path
Type
Category
Malicious
Installer.bat
DOS batch file, ASCII text, with CRLF line terminators
initial sample
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Installer.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cacls.exe
"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ndfapi.dll,-40001

Memdumps

Base Address
Regiontype
Protect
Malicious
20BF7488000
heap
page read and write
A181CBB000
stack
page read and write
20BF7477000
heap
page read and write
A181D3E000
stack
page read and write
20BF747D000
heap
page read and write
20BF7470000
heap
page read and write
20BF7350000
heap
page read and write
A181DBF000
stack
page read and write
20BF7450000
heap
page read and write
20BF7590000
heap
page read and write
20BF7595000
heap
page read and write
20BF7430000
heap
page read and write
There are 2 hidden memdumps, click here to show them.