Edit tour
Windows
Analysis Report
Summaryform_FXnbLLyKOJ.wsf
Overview
General Information
Detection
AsyncRAT, PureLog Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected BrowserPasswordDump
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
Found suspicious ZIP file
Injects a PE file into a foreign processes
Powershell uses Background Intelligent Transfer Service (BITS)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 4552 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Summa ryform_FXn bLLyKOJ.ws f" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 3360 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" - command "[ xml]$xmldo c = Get-Co ntent 'C:\ Users\Publ ic\NDKJPlE EYLhKqtGW. xml'; $com mand = $xm ldoc.comma nd.a.execu te; Invoke -Expressio n $command MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 4180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wscript.exe (PID: 4044 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\Public \TextCZvTb YMEYspgaPV o.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - net.exe (PID: 5864 cmdline:
"C:\Window s\System32 \net.exe" session MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 2940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 5048 cmdline:
C:\Windows \system32\ net1 sessi on MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - cmd.exe (PID: 4232 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\n KNmegHQBbm lQMTN.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2488 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5024 cmdline:
powershell .exe -NoPr ofile -Win dowStyle H idden -Exe cutionPoli cy Bypass -Command " & 'C:\User s\Public\D nWEdFPemZv dtKRs.ps1' " MD5: 04029E121A0CFA5991749937DD22A1D9)
- svchost.exe (PID: 2096 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- wscript.exe (PID: 1216 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\Public\N ewRdpFirst Try.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - net.exe (PID: 1176 cmdline:
"C:\Window s\System32 \net.exe" session MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 6368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 6672 cmdline:
C:\Windows \system32\ net1 sessi on MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - cmd.exe (PID: 1484 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\s olankedoub ledigits.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1584 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4156 cmdline:
powershell .exe -NoPr ofile -Win dowStyle H idden -Exe cutionPoli cy Bypass -Command " & 'C:\User s\Public\n ewrdptry.p s1'" MD5: 04029E121A0CFA5991749937DD22A1D9) - RegSvcs.exe (PID: 3816 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\RegS vcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- wscript.exe (PID: 5068 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\Public\N ewRdpFirst Try.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - net.exe (PID: 7104 cmdline:
"C:\Window s\System32 \net.exe" session MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 3928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 2304 cmdline:
C:\Windows \system32\ net1 sessi on MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - cmd.exe (PID: 5484 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\s olankedoub ledigits.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2260 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7092 cmdline:
powershell .exe -NoPr ofile -Win dowStyle H idden -Exe cutionPoli cy Bypass -Command " & 'C:\User s\Public\n ewrdptry.p s1'" MD5: 04029E121A0CFA5991749937DD22A1D9) - RegSvcs.exe (PID: 5040 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\RegS vcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- wscript.exe (PID: 5968 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\Public\N ewRdpFirst Try.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - net.exe (PID: 3872 cmdline:
"C:\Window s\System32 \net.exe" session MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 5316 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 64 cmdline:
C:\Windows \system32\ net1 sessi on MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - cmd.exe (PID: 5480 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\s olankedoub ledigits.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3492 cmdline:
powershell .exe -NoPr ofile -Win dowStyle H idden -Exe cutionPoli cy Bypass -Command " & 'C:\User s\Public\n ewrdptry.p s1'" MD5: 04029E121A0CFA5991749937DD22A1D9) - RegSvcs.exe (PID: 3728 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\RegS vcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
{"Ports": ["6666"], "Server": ["shefonew07.ddns.net"], "Mutex": "AsyncMutex_dHCTyo6u65FEkSZ3", "Certificate": "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", "Server Signature": "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"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen |
| |
Click to see the 51 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 35 entries |
System Summary |
---|
Source: | Author: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: frack113, Florian Roth: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: frack113: |
Source: | Author: vburov: |
Timestamp: | 03/14/24-16:35:17.108992 |
SID: | 2035595 |
Source Port: | 6666 |
Destination Port: | 49711 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 03/14/24-16:35:17.108992 |
SID: | 2030673 |
Source Port: | 6666 |
Destination Port: | 49711 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | URL Reputation: |
Source: | Malware Configuration Extractor: |