Overview
overview
10Static
static
1PMOy4QqKcU...PF.zip
windows7-x64
1PMOy4QqKcU...PF.zip
windows10-2004-x64
11.bat
windows7-x64
11.bat
windows10-2004-x64
1detonator.cmd
windows7-x64
4detonator.cmd
windows10-2004-x64
7dqjg.ps1
windows7-x64
1dqjg.ps1
windows10-2004-x64
1dqjg.vbs
windows7-x64
1dqjg.vbs
windows10-2004-x64
3th5rk551.uku.ps1
windows7-x64
1th5rk551.uku.ps1
windows10-2004-x64
1vuso.ps1
windows7-x64
1vuso.ps1
windows10-2004-x64
10Analysis
-
max time kernel
40s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
1.bat
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
1.bat
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
detonator.cmd
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
detonator.cmd
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
dqjg.ps1
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
dqjg.ps1
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
dqjg.vbs
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
dqjg.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
th5rk551.uku.ps1
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
th5rk551.uku.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
vuso.ps1
Resource
win7-20230703-en
General
-
Target
vuso.ps1
-
Size
154KB
-
MD5
07f743d7d5bff6f276abdf9c782e3f91
-
SHA1
7dd2d5f5e1a7857b7173629139a7d1916b3977b2
-
SHA256
3aa145e796c24355657a378a74fcde3edd401736b75ec6446c085f813069c5d9
-
SHA512
357b9da6abf72319ddd7cd917e1deb36bf149c96388cfc7500c7cf0d321aba8dfcde8fb61f66e8128b5308330f27687d60d073b236a436994b33427ef60d2490
-
SSDEEP
3072:xpNVyYnJt0WOUkX6U1O315T3Apmf+QIQG:xpmYnz03Uk2315T3Apmf+QI7
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
hognyusket.com:6606
hognyusket.com:7707
hognyusket.com:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral14/memory/1348-146-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5060 set thread context of 1348 5060 powershell.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5060 powershell.exe 5060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 1348 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80 PID 5060 wrote to memory of 1348 5060 powershell.exe 80
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\vuso.ps11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82