Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 13:11

General

  • Target

    hy.ps1

  • Size

    9.0MB

  • MD5

    c867dbeca2907417d58f0bfb4de699d6

  • SHA1

    fa942ea34e59c938d9c307a9c5054118b21fa699

  • SHA256

    19317da5733e40de48774b836f81b6edd83a60976ef180b6e796928399cee1c3

  • SHA512

    2658decfca16f085932c43ee6397cb449ab7ecf041d2c46630a5fdb3075c21eb9e5836ddb2e9018f4aac99f68ba9a1c3e19973da5c9ca58fc9bb2f7278b557e5

  • SSDEEP

    24576:sEAjJLSsZ05S8PllqWR4Q4/YVwCxCpMt8JNim5irz5aRt5vQZUZMc7JS0Ccn3ban:W8RVkwoFZ0qQpynBV

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

91.92.252.234:3232

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3272
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\hy.ps1
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2596
      • C:\Windows\System32\notepad.exe
        C:\Windows\System32\notepad.exe
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:3956
        • C:\Windows\System32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          3⤵
            PID:2700
            • C:\Windows\System32\chcp.com
              chcp 65001
              4⤵
                PID:1240
              • C:\Windows\System32\netsh.exe
                netsh wlan show profile
                4⤵
                  PID:2624
                • C:\Windows\System32\findstr.exe
                  findstr All
                  4⤵
                    PID:3216
                • C:\Windows\System32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                  3⤵
                    PID:2000
                    • C:\Windows\System32\chcp.com
                      chcp 65001
                      4⤵
                        PID:4292
                      • C:\Windows\System32\netsh.exe
                        netsh wlan show networks mode=bssid
                        4⤵
                          PID:3948

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g4ufumdk.r1i.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\a4bff383a5118b991cf9642d645e9bde\Admin@DTKUTJRL_en-US\System\Process.txt

                    Filesize

                    4KB

                    MD5

                    a69d63846548cad307babfdbe5ec3d57

                    SHA1

                    5241ba4430e05c5995b63de12e33b377828dc823

                    SHA256

                    a137992248e80d22bdab9e802de8a94b6824bcffb3d1d2031b4e6e2158fd1c2d

                    SHA512

                    541d6011bab23c0cafa0a883fc4f3aa5702bd4ee85c92ef488c80f9c085725b76f8aa9ca8459c17844715f0f8225e9a9c124e3ba92e3d40387b4829253ab9c1a

                  • memory/2596-21-0x0000020F84E20000-0x0000020F84E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/2596-0-0x0000020F9DD70000-0x0000020F9DD92000-memory.dmp

                    Filesize

                    136KB

                  • memory/2596-11-0x0000020F84E20000-0x0000020F84E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/2596-12-0x0000020F84E20000-0x0000020F84E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/2596-13-0x0000020F84E20000-0x0000020F84E30000-memory.dmp

                    Filesize

                    64KB

                  • memory/2596-14-0x0000020F9DEA0000-0x0000020F9DEFA000-memory.dmp

                    Filesize

                    360KB

                  • memory/2596-15-0x0000020F9DF60000-0x0000020F9DFBB000-memory.dmp

                    Filesize

                    364KB

                  • memory/2596-1-0x00007FF94FFF0000-0x00007FF950AB1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2596-25-0x0000020F9DF60000-0x0000020F9DFBB000-memory.dmp

                    Filesize

                    364KB

                  • memory/2596-24-0x00007FF94FFF0000-0x00007FF950AB1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3956-26-0x00007FF96DFF0000-0x00007FF96E1E5000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/3956-16-0x000001BFF9470000-0x000001BFF9486000-memory.dmp

                    Filesize

                    88KB

                  • memory/3956-19-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-18-0x00007FF94FFF0000-0x00007FF950AB1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3956-17-0x000001BFFAFA0000-0x000001BFFAFB6000-memory.dmp

                    Filesize

                    88KB

                  • memory/3956-29-0x000001BFFBE30000-0x000001BFFBEA6000-memory.dmp

                    Filesize

                    472KB

                  • memory/3956-31-0x000001BFFB190000-0x000001BFFB1AE000-memory.dmp

                    Filesize

                    120KB

                  • memory/3956-30-0x000001BFFBEB0000-0x000001BFFC038000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/3956-36-0x000001BFFB170000-0x000001BFFB17A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3956-20-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-180-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-182-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-185-0x00007FF94FFF0000-0x00007FF950AB1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3956-195-0x000001BFFC5B0000-0x000001BFFC62A000-memory.dmp

                    Filesize

                    488KB

                  • memory/3956-230-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-231-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-232-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-233-0x00007FF96DFF0000-0x00007FF96E1E5000-memory.dmp

                    Filesize

                    2.0MB

                  • memory/3956-234-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB

                  • memory/3956-235-0x000001BFFBC20000-0x000001BFFBC30000-memory.dmp

                    Filesize

                    64KB