Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 19:04

General

  • Target

    Server_lol123.ps1

  • Size

    762KB

  • MD5

    10305a80924712940646cca278cee796

  • SHA1

    6db80d4b3828f14ae105df2ba8ab3eccf2ab682f

  • SHA256

    2ec32c9efdb4ba49efc12bfda4ebc8dde498c618e3746f71ba72da884f8573c0

  • SHA512

    7efc040a317bcd3b5f3692f5930ecfea7cd4c52dd65727ed0c24907d3c01a142fb0f9b805cd21743ab635d1c00e8c4f3da0d2d8384dce308c7c296f2a1369c09

  • SSDEEP

    6144:ZWG30D0btNi7GUMC0a4dqWzYnx6fLRNmgvlFw9GMC68jDnyZT1JUOCN3N4mGNY/N:LZtnNqONsZtnNqOg

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

216.230.75.62:1107

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    windonws.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Server_lol123.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
        PID:2428
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        2⤵
        • Suspicious behavior: AddClipboardFormatListener
        PID:3692

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u1gxuu4c.2f1.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1376-77-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-119-0x000001AD8C030000-0x000001AD8C040000-memory.dmp
      Filesize

      64KB

    • memory/1376-1-0x000001AD8C030000-0x000001AD8C040000-memory.dmp
      Filesize

      64KB

    • memory/1376-12-0x000001AD8C030000-0x000001AD8C040000-memory.dmp
      Filesize

      64KB

    • memory/1376-13-0x000001ADA4980000-0x000001ADA49B0000-memory.dmp
      Filesize

      192KB

    • memory/1376-15-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-14-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-17-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-23-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-21-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-19-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-27-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-25-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-29-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-31-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-33-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-49-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-47-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-63-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-65-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-61-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-69-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-59-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-73-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-71-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-75-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-67-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-0-0x00007FFB0A410000-0x00007FFB0AED1000-memory.dmp
      Filesize

      10.8MB

    • memory/1376-2-0x000001ADA47F0000-0x000001ADA4812000-memory.dmp
      Filesize

      136KB

    • memory/1376-55-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-53-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-51-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-45-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-43-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-41-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-39-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-118-0x000001ADA4600000-0x000001ADA4601000-memory.dmp
      Filesize

      4KB

    • memory/1376-57-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-37-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-35-0x000001ADA4980000-0x000001ADA49AA000-memory.dmp
      Filesize

      168KB

    • memory/1376-228-0x000001ADA49E0000-0x000001ADA49E1000-memory.dmp
      Filesize

      4KB

    • memory/1376-233-0x00007FFB0A410000-0x00007FFB0AED1000-memory.dmp
      Filesize

      10.8MB

    • memory/2428-121-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/2428-122-0x00000000749D0000-0x0000000075180000-memory.dmp
      Filesize

      7.7MB

    • memory/2428-123-0x00000000056F0000-0x0000000005700000-memory.dmp
      Filesize

      64KB

    • memory/2428-239-0x00000000749D0000-0x0000000075180000-memory.dmp
      Filesize

      7.7MB

    • memory/2428-240-0x00000000056F0000-0x0000000005700000-memory.dmp
      Filesize

      64KB

    • memory/3692-234-0x00000000749D0000-0x0000000075180000-memory.dmp
      Filesize

      7.7MB

    • memory/3692-232-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/3692-236-0x0000000005830000-0x0000000005DD4000-memory.dmp
      Filesize

      5.6MB

    • memory/3692-237-0x0000000005360000-0x00000000053F2000-memory.dmp
      Filesize

      584KB

    • memory/3692-235-0x0000000005170000-0x0000000005180000-memory.dmp
      Filesize

      64KB

    • memory/3692-238-0x0000000005550000-0x000000000555A000-memory.dmp
      Filesize

      40KB

    • memory/3692-241-0x00000000749D0000-0x0000000075180000-memory.dmp
      Filesize

      7.7MB

    • memory/3692-242-0x0000000005170000-0x0000000005180000-memory.dmp
      Filesize

      64KB