Analysis
-
max time kernel
57s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
powershell.bat
Resource
win7-20231129-en
General
-
Target
powershell.bat
-
Size
111KB
-
MD5
03da5f58a0bdb43aaa8f2e33e041c3a4
-
SHA1
131d67d49353814130e9dc8e292161a00989a9b0
-
SHA256
f832991a5ecf5721f059ad2995b70ec91b1f818b2da49e52031a561a14f85eb1
-
SHA512
49801fcfad32719d6158f565755e194760b7cd6b572c7fd16858ce4fb531b6242d881505bceee370b31f07fc8a8e63fceb67e989d3ddf6c9ca199a72f26c39e5
-
SSDEEP
1536:zTEz4CNAz9vD/fajMlajScTrRaH49XEXNHXcX5XX/z85fPxDbqKj/2zbXg9xbUKn:sl++g8HzbXy
Malware Config
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233b2-4.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3764 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4632 4152 cmd.exe 82 PID 4152 wrote to memory of 4632 4152 cmd.exe 82 PID 4152 wrote to memory of 3764 4152 cmd.exe 83 PID 4152 wrote to memory of 3764 4152 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\powershell.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\certutil.execertutil -decodehex temp.hex powershell.exe2⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\powershell.exepowershell.exe2⤵
- Executes dropped EXE
PID:3764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD550da1353367e1d1ff85bc8ff9ae0e380
SHA12761f558421f207bff9f20a4be0a7ff6bbfb813b
SHA256dbb26483b24bc8db9e89bb9c31ee58b7f55bc1af4081cf63dea45da2c134cb3b
SHA51293d958e452dac5f2c2a50ee3489b1589e088e5e95fad6bba2a6f80c162d6cb676ed7c283489b8af7b43adcc579841471ad22cb2a814d6d62a51672cf162c56b2
-
Filesize
103KB
MD5f1e67289db4a8c6374e2c25f6c4acf2d
SHA115f4b4f49440a6e391e1c9b3884278df70cc93ba
SHA256df81f531a7d3dbee929f8e5bc59e89863d3ea4588658161e344f7f1e454734a5
SHA512debd19b4b3749b5c558cccb5ab8c51604ca0d7d8eb2a5c43259cf433ebd27301218119189fc5c49d91b272cb9535bba73c57a96777abc5a2a752e3e0f11489f3