Overview
overview
10Static
static
Launcher.zip
windows7-x64
1Launcher.zip
windows10-2004-x64
1Launcher/INFO.txt
windows7-x64
1Launcher/INFO.txt
windows10-2004-x64
1Launcher/Opener.bat
windows7-x64
7Launcher/Opener.bat
windows10-2004-x64
10Launcher/zzen.zip
windows7-x64
1Launcher/zzen.zip
windows10-2004-x64
1bypasser
windows7-x64
1bypasser
windows10-2004-x64
1gpasser.cmd
windows7-x64
1gpasser.cmd
windows10-2004-x64
1ks.vbs
windows7-x64
1ks.vbs
windows10-2004-x64
1Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Launcher.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Launcher/INFO.txt
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Launcher/INFO.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Launcher/Opener.bat
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
Launcher/Opener.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Launcher/zzen.zip
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Launcher/zzen.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
bypasser
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
bypasser
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
gpasser.cmd
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
gpasser.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ks.vbs
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ks.vbs
Resource
win10v2004-20220901-en
General
-
Target
Launcher/Opener.bat
-
Size
2KB
-
MD5
8092113dbaa8ee234de6ee8039b7db66
-
SHA1
6cdb65dd9e6aaa54a82ff3ac10e1b9b40bfc8e39
-
SHA256
576e869202da1137de261ed1519ad0487331a69db5890b0746b5bf4d310d3992
-
SHA512
badfd71b652f9a3c91c690269e0ef36496998614a0d7c30bbbed8bebb163bac5590fed3188ae907829536cb96a008299ad63d6950ebb9623f927877f89197754
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1300 cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1232 powershell.exe 668 powershell.exe 2028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 668 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exedescription pid process target process PID 1300 wrote to memory of 1232 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 1232 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 1232 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 668 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 668 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 668 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 1708 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 1708 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 1708 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 276 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 276 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 276 1300 cmd.exe cmd.exe PID 1300 wrote to memory of 2028 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 2028 1300 cmd.exe powershell.exe PID 1300 wrote to memory of 2028 1300 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Launcher\Opener.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ren zzen.dll -newname kola.zip2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Expand-Archive kola.zip -DestinationPath (Get-Location).path2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd start cmd /c gpasser.cmd ks.avi2⤵
-
C:\Windows\system32\cmd.execmd start cmd /c gpasser.cmd bypasser2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ren ks.avi -newname ks.bat2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD57eb89ff61baecef9cd0706abc26e6d56
SHA189eaf4a8637b66ae749f6bcaf3ad00a1701b2588
SHA256569ee732319f489795136b5758d02a29ceb34ec388e11ab50326b5c5a5b866d8
SHA512153b2c82a902cd29fd9edadec2277c32c675765b4132330106e18f2e2eede47feb05bd7dbaa53ee8bd713e22cecb8d25507d73a7d064515a8cad708c56253db4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD57eb89ff61baecef9cd0706abc26e6d56
SHA189eaf4a8637b66ae749f6bcaf3ad00a1701b2588
SHA256569ee732319f489795136b5758d02a29ceb34ec388e11ab50326b5c5a5b866d8
SHA512153b2c82a902cd29fd9edadec2277c32c675765b4132330106e18f2e2eede47feb05bd7dbaa53ee8bd713e22cecb8d25507d73a7d064515a8cad708c56253db4
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/276-71-0x0000000000000000-mapping.dmp
-
memory/668-67-0x00000000022C4000-0x00000000022C7000-memory.dmpFilesize
12KB
-
memory/668-66-0x000007FEF3180000-0x000007FEF3CDD000-memory.dmpFilesize
11.4MB
-
memory/668-69-0x00000000022CB000-0x00000000022EA000-memory.dmpFilesize
124KB
-
memory/668-68-0x00000000022C4000-0x00000000022C7000-memory.dmpFilesize
12KB
-
memory/668-62-0x0000000000000000-mapping.dmp
-
memory/668-65-0x000007FEF3CE0000-0x000007FEF4703000-memory.dmpFilesize
10.1MB
-
memory/1232-57-0x000007FEF3B20000-0x000007FEF467D000-memory.dmpFilesize
11.4MB
-
memory/1232-56-0x000007FEF4680000-0x000007FEF50A3000-memory.dmpFilesize
10.1MB
-
memory/1232-54-0x0000000000000000-mapping.dmp
-
memory/1232-61-0x000000000264B000-0x000000000266A000-memory.dmpFilesize
124KB
-
memory/1232-60-0x0000000002644000-0x0000000002647000-memory.dmpFilesize
12KB
-
memory/1232-59-0x000000001B740000-0x000000001BA3F000-memory.dmpFilesize
3.0MB
-
memory/1232-58-0x0000000002644000-0x0000000002647000-memory.dmpFilesize
12KB
-
memory/1232-55-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmpFilesize
8KB
-
memory/1708-70-0x0000000000000000-mapping.dmp
-
memory/2028-72-0x0000000000000000-mapping.dmp
-
memory/2028-76-0x000007FEF4680000-0x000007FEF50A3000-memory.dmpFilesize
10.1MB
-
memory/2028-77-0x000007FEF3B20000-0x000007FEF467D000-memory.dmpFilesize
11.4MB
-
memory/2028-78-0x00000000026F4000-0x00000000026F7000-memory.dmpFilesize
12KB
-
memory/2028-79-0x000000001B800000-0x000000001BAFF000-memory.dmpFilesize
3.0MB
-
memory/2028-81-0x00000000026FB000-0x000000000271A000-memory.dmpFilesize
124KB
-
memory/2028-80-0x00000000026F4000-0x00000000026F7000-memory.dmpFilesize
12KB