Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22-09-2023 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ekeng-mta.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ekeng-mta.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
mta.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
mta.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
mta.ps1
Resource
win7-20230831-en
General
-
Target
mta.ps1
-
Size
743B
-
MD5
d4567ca45aded54298f9ccf063ed89cf
-
SHA1
72ef210030f0f470433a6aacc66dfbe4cbfdad5c
-
SHA256
60416198c9b2105c9204638fd00e154e2f5c32ba45f5a8ae2671bae565c062e9
-
SHA512
e616e9711a76525a30063b226c1c11131c30199a5cdb6389b6867e8a626d49abfa43c549f83f068fe7dfbe99c62c124ff838e318807ad65e8cd5db318088331e
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:31507
ajmlxbvgoegjpkevdnz
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral5/memory/1752-18-0x000000001BAD0000-0x000000001BAE8000-memory.dmp asyncrat -
Blocklisted process makes network request 33 IoCs
flow pid Process 2 1752 powershell.exe 3 1752 powershell.exe 4 1752 powershell.exe 5 1752 powershell.exe 6 1752 powershell.exe 7 1752 powershell.exe 8 1752 powershell.exe 9 1752 powershell.exe 10 1752 powershell.exe 11 1752 powershell.exe 12 1752 powershell.exe 13 1752 powershell.exe 14 1752 powershell.exe 15 1752 powershell.exe 16 1752 powershell.exe 17 1752 powershell.exe 18 1752 powershell.exe 19 1752 powershell.exe 20 1752 powershell.exe 21 1752 powershell.exe 22 1752 powershell.exe 23 1752 powershell.exe 24 1752 powershell.exe 25 1752 powershell.exe 26 1752 powershell.exe 27 1752 powershell.exe 28 1752 powershell.exe 29 1752 powershell.exe 30 1752 powershell.exe 31 1752 powershell.exe 32 1752 powershell.exe 33 1752 powershell.exe 34 1752 powershell.exe -
Downloads MZ/PE file
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1752 powershell.exe Token: SeDebugPrivilege 1752 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1752 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\mta.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1752