Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
B.ps1
Resource
win7-20230220-en
6 signatures
150 seconds
General
-
Target
B.ps1
-
Size
262KB
-
MD5
d3efb9110f676b9c6990ac8ce21af0d8
-
SHA1
6afc4f91405cadfa67694b475df3f36d903283f0
-
SHA256
df3d882332ccedd588c8bd095b4693cffb9d1a3b8359e6f005e16a9ebdce16aa
-
SHA512
329c113d57243ec5d6bfc69abf52ac1859e0307b81838cc6430e06bcf7ff75d4d5ecb3082b6d3ca891eb64988f8ac3fb1f8f952ba44399902f14a9af1fed5722
-
SSDEEP
1536:sz5LkCs68+OHLBdLb3YE4ZeLXxMxgswiYD:v
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
COFFEE
C2
1bxb.ddns.net:6606
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/784-66-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/784-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/784-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/784-70-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/784-72-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 784 2040 powershell.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29 PID 2040 wrote to memory of 784 2040 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\B.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:784
-