Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-07-2022 12:07
Static task
static1
Behavioral task
behavioral1
Sample
asyncnovodisparo.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
asyncnovodisparo.ps1
Resource
win10v2004-20220414-en
General
-
Target
asyncnovodisparo.ps1
-
Size
143KB
-
MD5
22349ef6db03e6edef6f007e79641351
-
SHA1
c03776ce09df11b0a94e125497d77f565b430fd6
-
SHA256
e170dce58acff291b1ee9cde4093d13ade6a32067b980dbd33033228cc377472
-
SHA512
563e869b3e98363a705173c4a70e2f46b737ebe56a649c24411c2a733968a40ad1037b4d4d391a6a7e872ac61979dd5912b87bd362dfcb37da116dd483e252c5
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
A_(_C.D.T_)_A
chromedata.accesscam.org:6606
chromedata.accesscam.org:7707
chromedata.accesscam.org:8808
chromedata.accesscam.org:4404
chromedata.accesscam.org:5505
chromedata.accesscam.org:3303
chromedata.accesscam.org:2222
chromedata.accesscam.org:5155
chromedata.accesscam.org:5122
chromedata.accesscam.org:9000
chromedata.accesscam.org:9999
chromedata.accesscam.org:8888
cdt.3utilities.com:6606
cdt.3utilities.com:7707
cdt.3utilities.com:8808
cdt.3utilities.com:4404
cdt.3utilities.com:5505
cdt.3utilities.com:3303
cdt.3utilities.com:2222
cdt.3utilities.com:5155
cdt.3utilities.com:5122
cdt.3utilities.com:9000
cdt.3utilities.com:9999
cdt.3utilities.com:8888
adobedata.webredirect.org:6606
adobedata.webredirect.org:7707
adobedata.webredirect.org:8808
adobedata.webredirect.org:4404
adobedata.webredirect.org:5505
adobedata.webredirect.org:3303
adobedata.webredirect.org:2222
adobedata.webredirect.org:5155
adobedata.webredirect.org:5122
adobedata.webredirect.org:9000
adobedata.webredirect.org:9999
adobedata.webredirect.org:8888
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5084-132-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/5084-133-0x000000000040DCBE-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3452 set thread context of 5084 3452 powershell.exe aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 3452 powershell.exe 3452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 3452 powershell.exe Token: SeDebugPrivilege 5084 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
powershell.exedescription pid process target process PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe PID 3452 wrote to memory of 5084 3452 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\asyncnovodisparo.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3452-130-0x0000028731780000-0x00000287317A2000-memory.dmpFilesize
136KB
-
memory/3452-131-0x00007FF8786D0000-0x00007FF879191000-memory.dmpFilesize
10.8MB
-
memory/3452-134-0x00007FF8786D0000-0x00007FF879191000-memory.dmpFilesize
10.8MB
-
memory/5084-132-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5084-133-0x000000000040DCBE-mapping.dmp
-
memory/5084-135-0x0000000005E10000-0x0000000005EAC000-memory.dmpFilesize
624KB
-
memory/5084-136-0x0000000006460000-0x0000000006A04000-memory.dmpFilesize
5.6MB
-
memory/5084-137-0x0000000005F20000-0x0000000005F86000-memory.dmpFilesize
408KB