Query Details
// ANY.RUN Obfuscated BAT Dropper Delivers NetSupport RAT post // https://www.linkedin.com/posts/any-run_obfuscated-virustotal-powershell-activity-7336393368698028034-cayg/ let QueryLookup = 1h; let ObfuscatedBAT = DeviceProcessEvents | where Timestamp > ago(QueryLookup) | where InitiatingProcessFileName =~ "cmd.exe" and InitiatingProcessCommandLine has ".bat" | where FileName =~ "powershell.exe" and ProcessCommandLine has "-WindowsStyle Hidden" and ProcessCommandLine has "Invoke-WebRequest" | distinct DeviceName; DeviceRegistryEvents | where Timestamp > ago(QueryLookup) | where ActionType == "RegistryValueSet" | where RegistryKey has "\\Software\\Microsoft\\Windows\\CurrentVersion\\Run" | where RegistryValueData has "client32.exe" | where DeviceName has_any(ObfuscatedBAT)
This query is designed to detect a specific type of malicious activity on devices within the last hour. Here's a simplified breakdown of what it does:
Identify Suspicious Processes:
Track Registry Changes:
Cross-Reference Devices:
Overall, this query aims to detect devices that might be compromised by an obfuscated batch script that downloads and potentially installs a remote access tool (RAT) like NetSupport, by observing both process execution patterns and registry modifications.

Steven Lim
Released: June 6, 2025
Tables
Keywords
Operators