Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
office.ps1
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
office.ps1
Resource
win7-20221111-en
General
-
Target
office.ps1
-
Size
172KB
-
MD5
40113b90033a17620cfab836e01c208e
-
SHA1
8b752278316f5af828ddf23f62d4b6d6c0591e6e
-
SHA256
ae60268e3dae5ed2ecb06c47642bb33cd4f79d0b980476f1a7c931e2a4ba32ca
-
SHA512
83d55d3e4c898b35879774a7ec469bfb33598ad0adec08012cedef170fc32515bd2d0378d4ffb658ca5eaa95187b65c46b7645a233990aae4c971e5e2bf95e5e
-
SSDEEP
1536:DYrP7b2WPgkSqZkjEHcFJXiKTClpXcclUXdCXxEbr7IlWMQvVhB8LCZsHXGwrAfO:D30
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
99
d1x3x.linkpc.net:6666
d1x3x.dyndns.org:6666
d1x3x.selfip.biz:6666
AsyncMutex_Devil
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/3448-134-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral3/memory/3448-135-0x0000000000410BCE-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4824 set thread context of 3448 4824 powershell.exe aspnet_compiler.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
aspnet_compiler.exepid process 3448 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeaspnet_compiler.exepid process 4824 powershell.exe 4824 powershell.exe 3448 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 4824 powershell.exe Token: SeDebugPrivilege 3448 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 3448 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
powershell.exedescription pid process target process PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe PID 4824 wrote to memory of 3448 4824 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\office.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3448