Analysis
-
max time kernel
77s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 13:07
Static task
static1
Behavioral task
behavioral1
Sample
BmckepSR.ps1
Resource
win7v20210410
General
-
Target
BmckepSR.ps1
-
Size
102KB
-
MD5
f7d5a302748c4a9597c27349e3f63fd1
-
SHA1
fcc71d41687fa5f221b25a76ce1df4223b813ffd
-
SHA256
9c6c9115420eb317d294ae65768bb0f65facd77fb3df489a7a8f301808ecfecf
-
SHA512
6a0400bc555f258ee05fddadee852b465ace689fbe08032bd12902c3fd75bb733c58bfed2767174546a27f56ee421445d8cbbc5f7cbfc81d8d8e3fa390806cc1
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3580-187-0x000000000040C71E-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1736 set thread context of 3580 1736 powershell.exe InstallUtil.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1112 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepid process 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 3580 InstallUtil.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
powershell.execsc.exeInstallUtil.execmd.exedescription pid process target process PID 1736 wrote to memory of 648 1736 powershell.exe csc.exe PID 1736 wrote to memory of 648 1736 powershell.exe csc.exe PID 648 wrote to memory of 2180 648 csc.exe cvtres.exe PID 648 wrote to memory of 2180 648 csc.exe cvtres.exe PID 1736 wrote to memory of 724 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 724 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 724 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 1736 wrote to memory of 3580 1736 powershell.exe InstallUtil.exe PID 3580 wrote to memory of 804 3580 InstallUtil.exe cmd.exe PID 3580 wrote to memory of 804 3580 InstallUtil.exe cmd.exe PID 3580 wrote to memory of 804 3580 InstallUtil.exe cmd.exe PID 804 wrote to memory of 1112 804 cmd.exe timeout.exe PID 804 wrote to memory of 1112 804 cmd.exe timeout.exe PID 804 wrote to memory of 1112 804 cmd.exe timeout.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\BmckepSR.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\txxi44nw\txxi44nw.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B9C.tmp" "c:\Users\Admin\AppData\Local\Temp\txxi44nw\CSC7B437A74882E4100A1AAE88329A26A7.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2EC1.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES1B9C.tmpMD5
709c97cd91546b9b1d1e94afc17b74a9
SHA147c61c5a6b05e40566a89bb5cbcc1bac0513da75
SHA256c79974592499a2994bf3ef1a28f653cd172a16c2f78508928cf9974b2c5f4dce
SHA5120971a6f5b0c4617dd4f499c88117808ad18ce0fcfb779597f1aa832c088a3f0c982f03b6e84860977613c308ab8fcaec367fba8540d6432b7f94c015f8f3bbcd
-
C:\Users\Admin\AppData\Local\Temp\tmp2EC1.tmp.batMD5
1ffcb52043f40edc5bf6f11f439db4c7
SHA128f6f5c2dd597c9e9396c57e269ec776a42ef18c
SHA25603a390753be121f09844a59b476713fba9a635aed805948aa1af9df3f1a1de7e
SHA512e474a6e9e45ef95019d5516e3df83227fc4125c4109ee087459de921a3b928ffc592e82f1108207becf3b7f2c770953c9bb262158ca631a610c2f1c4d1976c3d
-
C:\Users\Admin\AppData\Local\Temp\txxi44nw\txxi44nw.dllMD5
5b40eaa537e10ce4f76ecb7e8e64b815
SHA1bceb0aaac2084250898c63f58a3b830484ce4593
SHA256c983240657624dcdd76b8f7ffd1985d3ce53eaa6344bacc6dc5dc2aa93b78ee7
SHA5121a96083d21d6ecf2ac95c9ae832a52548c292ef0316c3929766aa3f106ec66ca8cf6a3380a988174fcd7c2ae4f016160dc4b8527bad7b108165135165f7d5426
-
\??\c:\Users\Admin\AppData\Local\Temp\txxi44nw\CSC7B437A74882E4100A1AAE88329A26A7.TMPMD5
2efe27c7796f3ad36c747ac526fe00db
SHA1e7acd5b5bbd468e8d3ad04c730211a70e8183767
SHA256710488952e1f8e5a3205e3dcffcb31ab65d07ceab455e6ee79c5f05a621b8b75
SHA5124793a5422d6fc57ce4870c3e4bd0ead0ae20183858d60cb8b54376d73e1379d8f4fbaec3217181a3b01940cfe2ac2df56560468dad88794f1167611e497bc7a9
-
\??\c:\Users\Admin\AppData\Local\Temp\txxi44nw\txxi44nw.0.csMD5
e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
\??\c:\Users\Admin\AppData\Local\Temp\txxi44nw\txxi44nw.cmdlineMD5
571adb632e81abb61914e363700c13cd
SHA1de0b16101e4b04eb17fad5a90e52148838bfafb9
SHA2561be185cbf1788b47136ed39e1d83e64bfea3bd294ef34d724fff136036d1b932
SHA512fbd033dfb5141d47438bfb4ce05fa7938e08e6ca0a57a504cc1bd45847bc77521af2db1bd435b4c8d06175da3530be8ae1376fcdb367bb803665d5e7bab12f25
-
memory/648-177-0x0000000000000000-mapping.dmp
-
memory/804-190-0x0000000000000000-mapping.dmp
-
memory/1112-192-0x0000000000000000-mapping.dmp
-
memory/1736-118-0x000001C135830000-0x000001C135831000-memory.dmpFilesize
4KB
-
memory/1736-123-0x000001C135B20000-0x000001C135B21000-memory.dmpFilesize
4KB
-
memory/1736-122-0x000001C135893000-0x000001C135895000-memory.dmpFilesize
8KB
-
memory/1736-184-0x000001C135AA0000-0x000001C135AA4000-memory.dmpFilesize
16KB
-
memory/1736-188-0x000001C135896000-0x000001C135898000-memory.dmpFilesize
8KB
-
memory/1736-119-0x000001C135890000-0x000001C135892000-memory.dmpFilesize
8KB
-
memory/2180-180-0x0000000000000000-mapping.dmp
-
memory/3580-187-0x000000000040C71E-mapping.dmp
-
memory/3580-189-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB