Analysis
-
max time kernel
61s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15-12-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
office.ps1
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
office.ps1
Resource
win7-20221111-en
General
-
Target
office.ps1
-
Size
172KB
-
MD5
40113b90033a17620cfab836e01c208e
-
SHA1
8b752278316f5af828ddf23f62d4b6d6c0591e6e
-
SHA256
ae60268e3dae5ed2ecb06c47642bb33cd4f79d0b980476f1a7c931e2a4ba32ca
-
SHA512
83d55d3e4c898b35879774a7ec469bfb33598ad0adec08012cedef170fc32515bd2d0378d4ffb658ca5eaa95187b65c46b7645a233990aae4c971e5e2bf95e5e
-
SSDEEP
1536:DYrP7b2WPgkSqZkjEHcFJXiKTClpXcclUXdCXxEbr7IlWMQvVhB8LCZsHXGwrAfO:D30
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
99
d1x3x.linkpc.net:6666
d1x3x.dyndns.org:6666
d1x3x.selfip.biz:6666
AsyncMutex_Devil
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/2036-62-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2036-63-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2036-61-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2036-64-0x0000000000410BCE-mapping.dmp asyncrat behavioral2/memory/2036-70-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2036-68-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2036-72-0x00000000006A0000-0x00000000006C4000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1336 set thread context of 2036 1336 powershell.exe aspnet_compiler.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
aspnet_compiler.exepid process 2036 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exeaspnet_compiler.exepid process 1336 powershell.exe 2036 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 1336 powershell.exe Token: SeDebugPrivilege 2036 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 2036 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
powershell.exedescription pid process target process PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe PID 1336 wrote to memory of 2036 1336 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\office.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036