Analysis
-
max time kernel
140s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
chris-server.ps1
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
chris-server.ps1
Resource
win10v2004-20220812-en
General
-
Target
chris-server.ps1
-
Size
255KB
-
MD5
7a82388b85eb4abac99ef658d7b0d1cf
-
SHA1
45cef26f5d4397ea8155857520a11a141ba465e2
-
SHA256
44b973071a7a8b22ab1a3defe1b2ec8028c39de957180e9a71e09b48c0d8a641
-
SHA512
2a112f190f56d9d2aad7e3b68369e45c89650334561ce9b7eca37a24e4b81089282b1889e9f0df501ae6c9f4430b686ec6a9c46d140740d002c143520c6dd723
-
SSDEEP
6144:wRQRmeIR/ENCsO8cruAw9GH8dIhpk/Gkk4DwS:SXY7kHhpckLS
Malware Config
Extracted
asyncrat
0.5.7B
Default
107.173.63.199:5656
Monster_Master72381936781263781
-
delay
3
-
install
false
-
install_file
Explorer.exe
-
install_folder
%AppData%
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POWERSHELL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 1472 POWERSHELL.exe -
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4324-155-0x000000000040D06E-mapping.dmp asyncrat behavioral2/memory/4324-160-0x0000000000830000-0x0000000000842000-memory.dmp asyncrat -
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4692 set thread context of 4324 4692 powershell.exe aspnet_compiler.exe -
Modifies registry class 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" reg.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exepowershell.exepid process 1316 powershell.exe 1316 powershell.exe 3796 powershell.exe 3796 powershell.exe 3752 POWERSHELL.exe 3752 POWERSHELL.exe 4692 powershell.exe 4692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.exedescription pid process Token: SeDebugPrivilege 1316 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3752 POWERSHELL.exe Token: SeIncreaseQuotaPrivilege 3796 powershell.exe Token: SeSecurityPrivilege 3796 powershell.exe Token: SeTakeOwnershipPrivilege 3796 powershell.exe Token: SeLoadDriverPrivilege 3796 powershell.exe Token: SeSystemProfilePrivilege 3796 powershell.exe Token: SeSystemtimePrivilege 3796 powershell.exe Token: SeProfSingleProcessPrivilege 3796 powershell.exe Token: SeIncBasePriorityPrivilege 3796 powershell.exe Token: SeCreatePagefilePrivilege 3796 powershell.exe Token: SeBackupPrivilege 3796 powershell.exe Token: SeRestorePrivilege 3796 powershell.exe Token: SeShutdownPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeSystemEnvironmentPrivilege 3796 powershell.exe Token: SeRemoteShutdownPrivilege 3796 powershell.exe Token: SeUndockPrivilege 3796 powershell.exe Token: SeManageVolumePrivilege 3796 powershell.exe Token: 33 3796 powershell.exe Token: 34 3796 powershell.exe Token: 35 3796 powershell.exe Token: 36 3796 powershell.exe Token: SeIncreaseQuotaPrivilege 3796 powershell.exe Token: SeSecurityPrivilege 3796 powershell.exe Token: SeTakeOwnershipPrivilege 3796 powershell.exe Token: SeLoadDriverPrivilege 3796 powershell.exe Token: SeSystemProfilePrivilege 3796 powershell.exe Token: SeSystemtimePrivilege 3796 powershell.exe Token: SeProfSingleProcessPrivilege 3796 powershell.exe Token: SeIncBasePriorityPrivilege 3796 powershell.exe Token: SeCreatePagefilePrivilege 3796 powershell.exe Token: SeBackupPrivilege 3796 powershell.exe Token: SeRestorePrivilege 3796 powershell.exe Token: SeShutdownPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeSystemEnvironmentPrivilege 3796 powershell.exe Token: SeRemoteShutdownPrivilege 3796 powershell.exe Token: SeUndockPrivilege 3796 powershell.exe Token: SeManageVolumePrivilege 3796 powershell.exe Token: 33 3796 powershell.exe Token: 34 3796 powershell.exe Token: 35 3796 powershell.exe Token: 36 3796 powershell.exe Token: SeIncreaseQuotaPrivilege 3796 powershell.exe Token: SeSecurityPrivilege 3796 powershell.exe Token: SeTakeOwnershipPrivilege 3796 powershell.exe Token: SeLoadDriverPrivilege 3796 powershell.exe Token: SeSystemProfilePrivilege 3796 powershell.exe Token: SeSystemtimePrivilege 3796 powershell.exe Token: SeProfSingleProcessPrivilege 3796 powershell.exe Token: SeIncBasePriorityPrivilege 3796 powershell.exe Token: SeCreatePagefilePrivilege 3796 powershell.exe Token: SeBackupPrivilege 3796 powershell.exe Token: SeRestorePrivilege 3796 powershell.exe Token: SeShutdownPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeSystemEnvironmentPrivilege 3796 powershell.exe Token: SeRemoteShutdownPrivilege 3796 powershell.exe Token: SeUndockPrivilege 3796 powershell.exe Token: SeManageVolumePrivilege 3796 powershell.exe Token: 33 3796 powershell.exe Token: 34 3796 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
powershell.exepowershell.exePOWERSHELL.execmd.execmd.exepowershell.exedescription pid process target process PID 1316 wrote to memory of 3796 1316 powershell.exe powershell.exe PID 1316 wrote to memory of 3796 1316 powershell.exe powershell.exe PID 3796 wrote to memory of 2280 3796 powershell.exe WScript.exe PID 3796 wrote to memory of 2280 3796 powershell.exe WScript.exe PID 3752 wrote to memory of 4900 3752 POWERSHELL.exe cmd.exe PID 3752 wrote to memory of 4900 3752 POWERSHELL.exe cmd.exe PID 4900 wrote to memory of 1872 4900 cmd.exe reg.exe PID 4900 wrote to memory of 1872 4900 cmd.exe reg.exe PID 4900 wrote to memory of 3488 4900 cmd.exe reg.exe PID 4900 wrote to memory of 3488 4900 cmd.exe reg.exe PID 4900 wrote to memory of 4516 4900 cmd.exe cmd.exe PID 4900 wrote to memory of 4516 4900 cmd.exe cmd.exe PID 4516 wrote to memory of 4692 4516 cmd.exe powershell.exe PID 4516 wrote to memory of 4692 4516 cmd.exe powershell.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe PID 4692 wrote to memory of 4324 4692 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\chris-server.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbs"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWERSHELL.exePOWERSHELL -noProfilE -ExEcutionPolicy Bypass -Command C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} /f3⤵
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 /ve /t REG_SZ /d C:\IDontExist.dll /f3⤵
- Registers COM server for autorun
- Modifies registry class
- Modifies registry key
-
C:\Windows\system32\cmd.execMd.E"x"e /c =PoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWerShelL"."eXe -noP -WIn hIdDen -ep ByPaSs -Command "& 'C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1'"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.batFilesize
706B
MD5c5dc49fe999bbd184028c2322216f34f
SHA16de54f03eaf77fe28e88f6ad461b37371da0db0c
SHA25634bd396295ba567cc78dfa910e6e9db8d54b35df73a553c91a407f067bbe2241
SHA512e30064f421f37310bb6a3156e1f54fe7cb7988bc26947ebef7d1933ba7b912077cc855ebb9d5da18aa5a8f92043c5cbab887212f9a5a9810e07eebfc23168454
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.ps1Filesize
3KB
MD5c800c44beca2cfa73dc8113cb84e90d4
SHA1aca79156fb80732bc556472574f04d40b3d4a0e2
SHA2564f72092255c228f5c03546a3c351baae4f3bb9d6eb8aeb0c709c74da6ec9f09d
SHA512e384d770f00c566d3246f0aa67b47033bad4713e0c5341e258b951e26bee4205ec9037732393b06b2966903f216dd0c55791c6d6c067a543c93de53cd126f466
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\JZKPPKGTHBOIPSRKOCOKSH.vbsFilesize
2KB
MD56be2ca965d6ec7eed5fc2ca94c70be5d
SHA1127a21034790b8f07a4c6c95b64b0253011df068
SHA256a134febf91fe6fe748bfe937aefa809349f3c36a5791516d4cfc5bf7f2db9525
SHA512da9a71167f22f394f72fbf153571b75dbce4642331f5d59b2f6cb7e4f64a3faf7267b188760e74d27804b70f55d83f3e44ae77a6344d80039d59658571d83565
-
C:\ProgramData\JZKPPKGTHBOIPSRKOCOKSH\RUCXFGHJUCVOFVUZVIPNCG.ps1Filesize
245KB
MD59003c61627db62d6d2091d2b6383a630
SHA11b80514173761d3627d737b1e7dea52abb5c8761
SHA256864e1a7757e96375629837f696cbf6ac1d3db941949dbdbaa52538ee0d4010da
SHA512deb3db4961ec6d49a11ebc143a8d54c1c383dd27dd753638b766fd7877a27cd7c69de8bf8691b248f10f0bbee787f487fb1e6ff5fea5b3a0e3bdb6ddd16f3c33
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD500e7da020005370a518c26d5deb40691
SHA1389b34fdb01997f1de74a5a2be0ff656280c0432
SHA256a529468d442b807290b41565130e4c52760af9abec37613114db3857f11ad4fe
SHA5129a02bacc6fb922d6202548e80e345c6cdec346b79ef7ac7a56f89fd342ff128de004065b9d010d015b54d4ca72f665ca658c7ffcd8eb906e14bfa5b48b43f2cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5806286a9ea8981d782ba5872780e6a4c
SHA199fe6f0c1098145a7b60fda68af7e10880f145da
SHA256cd2c977928e78b2d39bba8a726308f17b2946ea3f1a432de209720f691450713
SHA512362df97f9fc9c2f546538814cd0402a364a286326219f03325f8cbd59d33f9d850c26daf42230f0bb4feb7e5134868a51e7a3d2f5bc136fe3de69d5d82c5ae2e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD502a1a26525c65a359d41483180eaa6f7
SHA1c0e2578b92d20e925c1c87016d1a9fccee1ec56f
SHA256d0ec351493bdbc6cb94990b162bb8be5b0217277cc55ae12aa3c7ea704cdbc6e
SHA512d3271137241553f8316fcfc94dcf88c2887ee7bb0babddb4c1666fb5ae821a28425400299281422a4ebeb1f4c7369443b839d10f182279504bbba5f2f1cd94c2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
memory/1316-152-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/1316-134-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/1316-133-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/1316-132-0x0000018F77100000-0x0000018F77122000-memory.dmpFilesize
136KB
-
memory/1872-142-0x0000000000000000-mapping.dmp
-
memory/2280-138-0x0000000000000000-mapping.dmp
-
memory/3488-143-0x0000000000000000-mapping.dmp
-
memory/3752-146-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/3752-159-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/3796-149-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/3796-136-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/3796-135-0x0000000000000000-mapping.dmp
-
memory/4324-163-0x0000000005310000-0x0000000005376000-memory.dmpFilesize
408KB
-
memory/4324-162-0x0000000005E70000-0x0000000006414000-memory.dmpFilesize
5.6MB
-
memory/4324-161-0x0000000005820000-0x00000000058BC000-memory.dmpFilesize
624KB
-
memory/4324-155-0x000000000040D06E-mapping.dmp
-
memory/4324-154-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4324-160-0x0000000000830000-0x0000000000842000-memory.dmpFilesize
72KB
-
memory/4516-144-0x0000000000000000-mapping.dmp
-
memory/4692-148-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/4692-157-0x00007FF970370000-0x00007FF970E31000-memory.dmpFilesize
10.8MB
-
memory/4692-153-0x0000017CEA6E0000-0x0000017CEA6FA000-memory.dmpFilesize
104KB
-
memory/4692-145-0x0000000000000000-mapping.dmp
-
memory/4900-140-0x0000000000000000-mapping.dmp