Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
0969731d32678ac6f0be0896d03b2eb382d2dcd54645e55c621ea6152ebce8b2.ps1
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0969731d32678ac6f0be0896d03b2eb382d2dcd54645e55c621ea6152ebce8b2.ps1
Resource
win10v2004-20241007-en
General
-
Target
0969731d32678ac6f0be0896d03b2eb382d2dcd54645e55c621ea6152ebce8b2.ps1
-
Size
440KB
-
MD5
93bfb747191ea031f60faf9b15e7d43b
-
SHA1
4fa4a763f1c7f4436b869eb2959542e0d966bb88
-
SHA256
0969731d32678ac6f0be0896d03b2eb382d2dcd54645e55c621ea6152ebce8b2
-
SHA512
b34e3dbdb6bcd089dc9df23d22344f0644ffdbebe79e8ae99ff13e07cfacf93df64ca3a77b1341fd4f02a485965630c129634a66446952c27a25a09c421bd281
-
SSDEEP
1536:wUdAHeDN4NDabDzuCO4dfk2EJdMFXa/3qYrYUF1rGs4UPDc+dl3Cz6nKd35rmDex:w/XrXFWHlFHhfu88C
Malware Config
Extracted
asyncrat
AWS | 3Losh
New-Encrypt
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/M1nmWeTA
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 31 2756 powershell.exe 33 2756 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2756 powershell.exe 4060 powershell.exe 4648 powershell.exe 1092 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 api.ipify.org 31 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process target process PID 4060 set thread context of 3376 4060 powershell.exe aspnet_compiler.exe PID 4648 set thread context of 4544 4648 powershell.exe aspnet_compiler.exe PID 1092 set thread context of 2828 1092 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aspnet_compiler.exeaspnet_compiler.exeaspnet_compiler.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2756 powershell.exe 2756 powershell.exe 4060 powershell.exe 4060 powershell.exe 4648 powershell.exe 4648 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
Processes:
powershell.exepowershell.exeaspnet_compiler.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2756 powershell.exe Token: SeIncreaseQuotaPrivilege 2756 powershell.exe Token: SeSecurityPrivilege 2756 powershell.exe Token: SeTakeOwnershipPrivilege 2756 powershell.exe Token: SeLoadDriverPrivilege 2756 powershell.exe Token: SeSystemProfilePrivilege 2756 powershell.exe Token: SeSystemtimePrivilege 2756 powershell.exe Token: SeProfSingleProcessPrivilege 2756 powershell.exe Token: SeIncBasePriorityPrivilege 2756 powershell.exe Token: SeCreatePagefilePrivilege 2756 powershell.exe Token: SeBackupPrivilege 2756 powershell.exe Token: SeRestorePrivilege 2756 powershell.exe Token: SeShutdownPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeSystemEnvironmentPrivilege 2756 powershell.exe Token: SeRemoteShutdownPrivilege 2756 powershell.exe Token: SeUndockPrivilege 2756 powershell.exe Token: SeManageVolumePrivilege 2756 powershell.exe Token: 33 2756 powershell.exe Token: 34 2756 powershell.exe Token: 35 2756 powershell.exe Token: 36 2756 powershell.exe Token: SeIncreaseQuotaPrivilege 2756 powershell.exe Token: SeSecurityPrivilege 2756 powershell.exe Token: SeTakeOwnershipPrivilege 2756 powershell.exe Token: SeLoadDriverPrivilege 2756 powershell.exe Token: SeSystemProfilePrivilege 2756 powershell.exe Token: SeSystemtimePrivilege 2756 powershell.exe Token: SeProfSingleProcessPrivilege 2756 powershell.exe Token: SeIncBasePriorityPrivilege 2756 powershell.exe Token: SeCreatePagefilePrivilege 2756 powershell.exe Token: SeBackupPrivilege 2756 powershell.exe Token: SeRestorePrivilege 2756 powershell.exe Token: SeShutdownPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeSystemEnvironmentPrivilege 2756 powershell.exe Token: SeRemoteShutdownPrivilege 2756 powershell.exe Token: SeUndockPrivilege 2756 powershell.exe Token: SeManageVolumePrivilege 2756 powershell.exe Token: 33 2756 powershell.exe Token: 34 2756 powershell.exe Token: 35 2756 powershell.exe Token: 36 2756 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 3376 aspnet_compiler.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
WScript.exepowershell.exeWScript.exepowershell.exeWScript.exepowershell.exedescription pid process target process PID 4888 wrote to memory of 4060 4888 WScript.exe powershell.exe PID 4888 wrote to memory of 4060 4888 WScript.exe powershell.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4060 wrote to memory of 3376 4060 powershell.exe aspnet_compiler.exe PID 4652 wrote to memory of 4648 4652 WScript.exe powershell.exe PID 4652 wrote to memory of 4648 4652 WScript.exe powershell.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 4648 wrote to memory of 4544 4648 powershell.exe aspnet_compiler.exe PID 2340 wrote to memory of 1092 2340 WScript.exe powershell.exe PID 2340 wrote to memory of 1092 2340 WScript.exe powershell.exe PID 1092 wrote to memory of 3088 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 3088 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 3088 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 3820 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 3820 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 3820 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe PID 1092 wrote to memory of 2828 1092 powershell.exe aspnet_compiler.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0969731d32678ac6f0be0896d03b2eb382d2dcd54645e55c621ea6152ebce8b2.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\TvMusic.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass $usefont='ReadAllText';$resberrys='C:\Users\Public\Music\TvMusic.music';IEx([IO.File]::$usefont($resberrys))2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\TvMusic.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass $usefont='ReadAllText';$resberrys='C:\Users\Public\Music\TvMusic.music';IEx([IO.File]::$usefont($resberrys))2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\TvMusic.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass $usefont='ReadAllText';$resberrys='C:\Users\Public\Music\TvMusic.music';IEx([IO.File]::$usefont($resberrys))2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:3088
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:3820
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
Filesize
1KB
MD59bb49da19215c64f6b00468e04d68d57
SHA12a674ef233db152541b5a3e01ffd8d2477babdaf
SHA256e7add962b0f5b3798fc22df547b06506a5b647f7ac65c84b27184cbb8cb48f01
SHA51209bd1b16c4d5dbce809593d1d2f5458d678496f610c7e5accd6475b3d0be3fd195711b0a40904ed974e5d1663856b38f9ffe5f67adfcdb3afb6c098310da711c
-
Filesize
1KB
MD575ceacfce03c5a5e09954f2aa55b1e3b
SHA170c5515e12678a043e3c624d91f070181bb70a31
SHA256b72ed6a01752483eab4544a27801dc5e5d9f7d8295a9c3d39bcb5cd51319dace
SHA512cb2d700bdf3713cc24cfc70f188e5a5a78292d65e240400fbaf1beafd86dd9cb6b6aa67c0a38aafb9e9509511c72ced1bc0dec872cb1ba3cb3b99dbf3c5f5629
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
436KB
MD5699160a16bdf0536e0fa69adcbab1e19
SHA1ae8a6be22f05e119e7031edc79fb4a21f1268500
SHA2564e7889d60aa6df54e7b646e8ba30befa9bba6ddfca3ac1a5894429e0caa86295
SHA512bf2b94320790d54a3c30a57a34877f5d5d55e918943f1180fef50901b86b61e1bd48dd8c7af0a1a82de7f0b0e2af7b65dc6471fc616846c4260811c2ddc5c145
-
Filesize
229B
MD566a1516e1d1e821084441211567d2e87
SHA10e688c9a93ad2cc162ef48ca75e0148e69d95ab1
SHA256d57293641ff05fea6af21fb73a4064eca49e5979f2395305bdea2a00a5de6717
SHA5121b77505b03a4a9c2c9437fbb94e828f34ed5b74187a258443af778b9450dc346e7027267e4ad6d33ff96c4036d936eba9dee05efbe136678bec6d0f7b68ecf12