Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
img.jpg.ps1
Resource
win7-20221111-en
General
-
Target
img.jpg.ps1
-
Size
771KB
-
MD5
5ac2d245025afdd32eb83ee07c5eac2c
-
SHA1
2d7afe2482c8b00f64a3c06f1991e9d31e5e4992
-
SHA256
b1b279e81410d415a097e9cab59aa3a04728adf62095c99d1aee345b124d4b49
-
SHA512
f27af8054d6898da00de2b999cb421f26307d46f6b64c041d617b84b7012cec872e7f827f0befe71464e2ee0644d606a20cf231bbab52de9af78b806778f00e3
-
SSDEEP
3072:DWYU4444d444444444444444g44444444444444444K44444444444444449444a:D1/QImq4sn+kdnuzDT03ApT
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
x
jok7oda.publicvm.com:7777
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2772-151-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral2/memory/2772-152-0x00000000004107CE-mapping.dmp asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 5072 set thread context of 2772 5072 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2876 schtasks.exe 2860 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exeaspnet_compiler.exepid process 2632 powershell.exe 2632 powershell.exe 3924 powershell.exe 3924 powershell.exe 5072 powershell.exe 5072 powershell.exe 2772 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 2772 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
aspnet_compiler.exepid process 2772 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
powershell.exeWScript.exepowershell.exeWScript.exepowershell.exedescription pid process target process PID 2632 wrote to memory of 224 2632 powershell.exe WScript.exe PID 2632 wrote to memory of 224 2632 powershell.exe WScript.exe PID 224 wrote to memory of 3924 224 WScript.exe powershell.exe PID 224 wrote to memory of 3924 224 WScript.exe powershell.exe PID 3924 wrote to memory of 2876 3924 powershell.exe schtasks.exe PID 3924 wrote to memory of 2876 3924 powershell.exe schtasks.exe PID 3924 wrote to memory of 2860 3924 powershell.exe schtasks.exe PID 3924 wrote to memory of 2860 3924 powershell.exe schtasks.exe PID 3400 wrote to memory of 5072 3400 WScript.exe powershell.exe PID 3400 wrote to memory of 5072 3400 WScript.exe powershell.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 2772 5072 powershell.exe aspnet_compiler.exe PID 5072 wrote to memory of 4100 5072 powershell.exe schtasks.exe PID 5072 wrote to memory of 4100 5072 powershell.exe schtasks.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\img.jpg.ps11⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Logs\install.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Admin\AppData\Roaming\Logs\install.ps1'))3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn det /sc minute /st 00:10 /tr C:\Users\Admin\AppData\Roaming\Logs\Loader.vbs4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn administartor /SC minute /MO 3 /tr C:\Users\Admin\AppData\Roaming\Logs\Loader.vbs4⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\Logs\Loader.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass iex([IO.File]::ReadAllText('C:\Users\Admin\AppData\Roaming\Logs\Report.ps1'))2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /delete /tn det /f3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD527fdb1beb89b56345e585d480be3026b
SHA12626e41ca27668518d01c04e1579f77027ff31a1
SHA256ef8cd66cc241c6d899919ae6f8369334b20202bd4ad49acfa546d29300c533d2
SHA512bd8208c8763ad8a6c25b6363b8e0e2a3c694e4e0cabfe4ce5d40945bd1f4274b7da976997f825e95c4455bf6b2e20b5bd960609b172f7c70d3521cb2ab24d49a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5055cd1930e45c3d77aa744d53bcc29d9
SHA1af1464daf329f36930b71fb33119c61a13472b6d
SHA256fcd4a469c653f6bd319b201326633c2183a70184bc159c071915a9c4abd92d3c
SHA51200ee038f281f34c7d727b7d6d7734bdfc61ee742b33edc5f905adae6afa949b9a9da8c575d949e98b24b59005e469628e99f113e0fc612dc24bbba7f098fa65d
-
C:\Users\Admin\AppData\Roaming\Logs\Loader.vbsFilesize
1KB
MD57a1f08fd27f797b5a5cc2d79f8f6bba7
SHA1bd63d22c44ed12788a81cbc06b7c2bb91e0c338c
SHA256922dc773abdfd0812b0e1adcaabf9dea2e5f0264573266cf0b024feb984c632e
SHA512306649a84b7c57acb67d5baca1f288e9211028a19a2d9a2a331db59026d3c557a225eaaa4b325df9bc1bdf1cef2d823b1eadffaa40b6f1cf1d19ce5bfd77d449
-
C:\Users\Admin\AppData\Roaming\Logs\Report.ps1Filesize
766KB
MD58d881e40488abde98aa11a3c098e491c
SHA1379a8ce68bd5834e0df24b0dbcd22576d1cba800
SHA256aa918a89a7f9b75ced739a879db39a7b3ba1e322f4871fd32f731661847aaf9b
SHA51254106c664804e49d84a0398d9e0c60e076acf12e0a22646d0543d01684526b29125f9f8aa2120329b5aa4d8faa965bd197f541753c9985255ba8d1c5ff8860af
-
C:\Users\Admin\AppData\Roaming\Logs\install.ps1Filesize
237B
MD56bdb23dd1842efaa701ced26bb8ae3a5
SHA167938eee711bca4d76581ad4ce157d1f197c97f8
SHA2564e0c891ba520fc17f612e1d65b0549aea0533070237b7bc27ee36613e212429c
SHA51216b5044b13b3c172f50c0dbfb11544750385c92144e1a2fe7dc3a3d18b361d722c72668eb11fcccecdc7dc4858f22383432515f7c9f3a353b04e52d3c4622c0e
-
C:\Users\Admin\AppData\Roaming\Logs\install.vbsFilesize
2KB
MD5e35d96b22a7a748d8a85089ea37b003e
SHA16b91c72388ed718c5ea75d1bd31263c8cb466878
SHA25606b9130d3e031c4729ad96332ed15189d5391b88f81c5bbb0f3a94ac4a05185a
SHA512f45a67d4dc0338ba62cfd6413f7d02889a186b8893397f32df3c88dec903fd79c849ea38538aefead378db1ea2071a0a3b921d7f9fa35729ea71371c7a3d6809
-
memory/224-134-0x0000000000000000-mapping.dmp
-
memory/2632-136-0x00007FF9C7460000-0x00007FF9C7F21000-memory.dmpFilesize
10.8MB
-
memory/2632-132-0x000001C2A0200000-0x000001C2A0222000-memory.dmpFilesize
136KB
-
memory/2632-133-0x00007FF9C7460000-0x00007FF9C7F21000-memory.dmpFilesize
10.8MB
-
memory/2772-155-0x0000000005980000-0x0000000005F24000-memory.dmpFilesize
5.6MB
-
memory/2772-152-0x00000000004107CE-mapping.dmp
-
memory/2772-156-0x00000000055C0000-0x0000000005652000-memory.dmpFilesize
584KB
-
memory/2772-159-0x0000000005810000-0x0000000005876000-memory.dmpFilesize
408KB
-
memory/2772-151-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2772-158-0x0000000006170000-0x000000000620C000-memory.dmpFilesize
624KB
-
memory/2772-157-0x00000000055A0000-0x00000000055AA000-memory.dmpFilesize
40KB
-
memory/2860-143-0x0000000000000000-mapping.dmp
-
memory/2876-142-0x0000000000000000-mapping.dmp
-
memory/3924-144-0x00007FF9C7460000-0x00007FF9C7F21000-memory.dmpFilesize
10.8MB
-
memory/3924-139-0x00007FF9C7460000-0x00007FF9C7F21000-memory.dmpFilesize
10.8MB
-
memory/3924-137-0x0000000000000000-mapping.dmp
-
memory/4100-153-0x0000000000000000-mapping.dmp
-
memory/5072-154-0x00007FF9C7820000-0x00007FF9C82E1000-memory.dmpFilesize
10.8MB
-
memory/5072-150-0x00007FF9C7820000-0x00007FF9C82E1000-memory.dmpFilesize
10.8MB
-
memory/5072-149-0x00007FF9C7820000-0x00007FF9C82E1000-memory.dmpFilesize
10.8MB
-
memory/5072-146-0x0000000000000000-mapping.dmp