Analysis
-
max time kernel
197s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
40c0d2006ca35701294a9450cb8d44b0bf7f0e4363641bb890a84e5d89094183.ps1
Resource
win7-20220901-en
General
-
Target
40c0d2006ca35701294a9450cb8d44b0bf7f0e4363641bb890a84e5d89094183.ps1
-
Size
345KB
-
MD5
6f015e02b96b417ce0b84d76b6cb8353
-
SHA1
9596f8545e2c1a30a0b03931b4ff7e5bbb0e8161
-
SHA256
40c0d2006ca35701294a9450cb8d44b0bf7f0e4363641bb890a84e5d89094183
-
SHA512
bbe33d286a98597c0fb88dff7b9d29acfd7e3b44c3c2a4d1e41b9ba657b5870e8d344d651d47a00650efa3b3bce9e51980dcd0e521668add57942f208a84ce2b
-
SSDEEP
6144:J0EVR64eKCEIqQWVUBFJHFe933XjSuSTIoHv+JUB+b8jDQocIH/X:J0EVRpeKCEIqQWVUBFJHFe93ujTIoHvt
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
185.81.157.19:6666
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5072-135-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat behavioral2/memory/5072-136-0x000000000040E18E-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4180 set thread context of 5072 4180 powershell.exe aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepid process 4180 powershell.exe 4180 powershell.exe 4180 powershell.exe 4180 powershell.exe 4180 powershell.exe 4180 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4180 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
powershell.exedescription pid process target process PID 4180 wrote to memory of 2028 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 2028 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 2028 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 4920 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 4920 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 4920 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe PID 4180 wrote to memory of 5072 4180 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\40c0d2006ca35701294a9450cb8d44b0bf7f0e4363641bb890a84e5d89094183.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4180-132-0x000001F1FEB20000-0x000001F1FEB42000-memory.dmpFilesize
136KB
-
memory/4180-133-0x00007FF9D3CD0000-0x00007FF9D4791000-memory.dmpFilesize
10.8MB
-
memory/4180-134-0x00007FF9D3CD0000-0x00007FF9D4791000-memory.dmpFilesize
10.8MB
-
memory/4180-137-0x00007FF9D3CD0000-0x00007FF9D4791000-memory.dmpFilesize
10.8MB
-
memory/5072-135-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/5072-136-0x000000000040E18E-mapping.dmp