Key Takeaways
- Cyble Research and Intelligence Labs (CRIL) encountered a modified “Batman: Arkham City” game installer file that could propagate through phishing or third-party websites.
- Upon analysis, we determined that this installer is a modified version of the BatmanAC game, containing a malware executable alongside the genuine Batman game installer.
- The malware executable is employed to initiate the deployment of Meterpreter using a VBS dropper file.
- Meterpreter is then utilized to perform other malicious activities, including downloading additional malware from a remote server to the victim’s system.
Overview
On November 10th, CRIL came across a Batman game installer file on VirusTotal. After examining the installer file, we determined that it is a modified version of the popular cross-platform game “Batman: Arkham City (BatmanAC).”
Batman Arkham City is a popular action-adventure video game developed by Rocksteady Studios and released in 2011. The game is based on the DC Comics superhero Batman and his fight against crime in Gotham City. The game features a large open world, stealth mechanics, detective skills, gadgets, and combat.
The infection method is initiated with the download of a BatmanAC game installer file from phishing
websites or third-party sites that provide software and game applications. Upon installation, the installer drops a genuine Batman game installer file alongside a malicious executable file. The execution of this malware executable leads to the deployment of a VB script, subsequently dropping a Meterpreter that was encoded and embedded within the VBS file.
Meterpreter is a post-exploitation tool that belongs to the Metasploit framework, which is an open-source penetration testing tool. Meterpreter is specifically designed to provide a powerful, extensible platform for performing various post-exploitation activities on a compromised system. It allows a user to interact with the compromised system, execute commands, and perform a wide range of malicious actions.
The image below shows the infection chain of the compromised “Batman: Arkham City” game installer deploying Meterpreter.

Initial Infection
The origin of the modified game installer remains unidentified. It is presumed that the initial dissemination of the infection may begin from individuals downloading game applications from phishing websites or third-party sites that offer software and game applications.
Technical Details
For this technical analysis, we analyzed a sample named “BatmanArkhamCityUpdate1.01.exe,” which is a 64-bit Microsoft Cabinet self-extracting archive (SFX) file. The figure below shows the icon of the modified version of the Batman: Arkham City game installer application.

Within this SFX file, there are two distinct executables: “BATMAN~1.EXE,” a legitimate and safe Batman game application installer, and a malicious executable named “morho.exe,” as shown below.

Elevation permissions are necessary to complete the installation of the “BatmanArkhamCityUpdate1.01.exe” file. Upon execution of the Microsoft cabinet file with administrator privileges, it extracts and drops the BATMAN installer executable and malicious UPX-packed executable file in the below location of the %temp% folder.
- C:\Users\<Admin>\AppData\Local\Temp\IXP000.TMP\BATMAN~1.EXE
- C:\Users\<Admin>\AppData\Local\Temp\IXP000.TMP\morho.exe
The image below illustrates the extraction process of the Batman Arkham City game.

The figure below shows the dropped binary files of the Batman: Arkham City game into the victim’s system.

After dropping all the executable files, the installer first initiates the execution of “morho.exe” in the background.
Upon execution, it drops a VB script file named “integral.vbs” in the “C:\Windows” directory and subsequently runs it utilizing “WScript.exe.” The below figure shows the obfuscated content of the dropped VBS file.

The VBS dropper includes an embedded binary executable file encoded using a series of concatenated Chr() functions, as shown below.

The VB script performs the tasks of decoding the embedded binary, saving it as a file named “svchost.exe” in the %temp% folder, executing it, and subsequently removing the file to hide its traces. This executable file is identified as a tool known as “Meterpreter.”
Meterpreter
The Meterpreter payload is a post-exploitation tool associated with the open-source Metasploit project, recognized as a penetration testing platform. Cybersecurity professionals and ethical hackers widely use Metasploit to simulate and test security vulnerabilities in computer systems, networks, and applications. Despite its intended use by ethical hackers, some TAs utilize this framework for nefarious purposes in the creation and deployment of malware.
Meterpreter is a powerful, extensible tool to perform various post-exploitation activities on the victim’s system. It enables the TAs to engage with the compromised system, execute commands, and carry out a diverse set of tasks, such as File System Manipulation (download, upload, and delete files), Privilege Escalation (attempt to gain higher levels of access), Network Reconnaissance (scan and gather information about the network), Keylogging (capture keystrokes), System Information Gathering (Collect information about the target system).
Upon execution, Meterpreter (“svchost.exe”) establishes a connection with the Command-and-Control (C&C) server to carry out various types of tasks in the compromised system.
Malware Config
Family | Metasploit |
Version | windows/download_exec |
C&C | hxxp[:]//kraken[.]zapto[.]org:80/INITM |
The figure provided below illustrates the Shellcode featuring checksum values of API functions, which is utilized for establishing a connection to the C&C server.

Upon establishing a successful connection with the C&C, Meterpreter can perform post-exploitation activity, including downloading and executing additional malware to the target system.
Following the execution of Meterpreter, the “BatmanArkhamCityUpdate1.01.exe” starts the installation of the BatmanAC game application, misleading the victim into believing that they have successfully installed the game, as shown in the below process tree figure.

Conclusion
Threat Actors frequently focus on widely played games such as “Batman: Arkham City” because of the substantial user base and the inherent trust users have in well-established software. Exploiting this trust, attackers conceal malware as genuine game content, ensuring a wider impact for their malicious activities. This tactic allows them to engage in various malicious actions, taking advantage of the popularity and credibility of the targeted games.
In this case, the TAs developed an installer file that contains a genuine BatmanAC game installer alongside a malicious executable file. When the malware executable is executed successfully, it triggers the deployment of Meterpreter. This tool is then utilized to distribute further malware onto the target system, enabling a range of malicious activities.
Our Recommendations
- The initial infiltration might take place via phishing or third-party websites. It is crucial to only download and install software/Game applications from well-known and trusted sources.
- Employ network intrusion detection and prevention systems to monitor network traffic for known Metasploit signatures and suspicious activities.
- Deploy strong antivirus and anti-malware solutions to detect and remove malicious executables and scripts.
MITRE ATT&CK® Techniques
Tactic | Technique | Procedure |
Execution (TA0002) | Command and Scripting Interpreter: Windows Command Shell (T1059.003) | Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. |
Execution (TA0002) | Scripting (T1064) | Executes visual basic scripts |
Defense Evasion (TA0005) | Obfuscated Files or Information (T1027) | Sample is packed with UPX. |
Defense Evasion (TA0005) | Software Packing (T1027.002) | Packed with generic packer like UPX. |
Defense Evasion (TA0005) | Masquerading (T1036) | Creates files inside the system directory and creates malware file with genuine system filename (svchost.exe). |
C&C (TA0011) | Web Protocols (T1071.001) | Adversaries may communicate using HTTP for C&C communications |
C&C (TA0011) | Non-Application Layer Protocol (T1071) | Performs DNS lookups |
Indicators of Compromise (IOCs)
Indicators | Indicator Type | Description |
9d604af60870ff64834c2aad1f660a5c 0043ebc3ba7c98d8058d432c8899ecf23cde0614 5fedc28dc4e14dd4d5066b3642a4fe46848afd27ae1259de7935c2f6e41694b4 | MD5 SHA1 SHA256 | Modified BatmanAC game installer |
f9496cf4193234dac7557d9da1478a10 733dc420f6cdd65054a7fec38eb8beaa0848d00e 5db79d096541340be8b940564e15aa82b2f465aca0dd52f39025dd6772c0c204 | MD5 SHA1 SHA256 | morho.exe |
4e8e46ca0c736e88ac7e9a93ea164cfd 0e49cbcef909449d04b3033650e5fb1a58b8965c e2027d338d2177209109ca3867d5a84f8fda6dfe40c1a4a0afb63f894bea4f44 | MD5 SHA1 SHA256 | integral.vbs |
22b03f41e08b42d72978f71d9687ff18 087d76ed3d2ad95c9dd679137755ea8204f8d98d 61d740761cfd9834dcf7865fcef67233cd97d327520b0170678db3ded722e8b6 | MD5 SHA1 SHA256 | svchost.exe (Meterpreter) |
hxxp[:]//kraken[.]zapto[.]org/INITM | URL | C&C server |