Analysis

  • max time kernel
    95s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 07:56

General

  • Target

    vfrcxq.ps1

  • Size

    1KB

  • MD5

    0cdc732f0ded614eb23c08213bcf1e04

  • SHA1

    0cbca39b7b1a0ec9b930c38c1c60d50feed74ee3

  • SHA256

    7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6

  • SHA512

    86c92258d18f25c97215c68cd4ef09b0c1433ea9de27c00247537ea8a7c187d4428b1cb151c785d5544f17da8ba9b138ef59efd3c7f7546240bf7ae5a5b29eb7

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\vfrcxq.ps1
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of SetThreadContext
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gh5i3ir3\gh5i3ir3.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA374.tmp" "c:\Users\Admin\AppData\Local\Temp\gh5i3ir3\CSC3DD8B3EFA4A40F8892A9AF437CCC38.TMP"
        3⤵
          PID:4800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:3536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2252

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESA374.tmp

        Filesize

        1KB

        MD5

        7256927b8831b77d9f4db7b17a4730d1

        SHA1

        d7b2b88bb86c448aa4416a3f078b1126f5ac7b25

        SHA256

        7a6619ec7d85262d800f073475673aab553d34aed140598b13b4cbe69ed85c78

        SHA512

        2f64ee145c98ff4cc209964167e199df9dd286da7ed3b725d3e415a81ca10e0da2163a2c6db3b3a201c9d14b61f683e09c6b32f4134f0413f7128fa882bae13d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bhp2wtz4.r20.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\gh5i3ir3\gh5i3ir3.dll

        Filesize

        9KB

        MD5

        598a5edd7630b725c1d8716664c6b46f

        SHA1

        75136b5dfed9df3bcfe4cdcb93aeca98c9f3e15e

        SHA256

        afc156e77b41809ff67d2a419e1d25e03850513718372a65cb80c18e7d6f8a60

        SHA512

        24f12ccf353fda862bd149ea11b3191aa282f0d9b34aa39318cc06c6f6ba77c2ff3bcb8e04d53229d163a729d01aefd6c72acc09588e448fb130b5e608cfd655

      • \??\c:\Users\Admin\AppData\Local\Temp\gh5i3ir3\CSC3DD8B3EFA4A40F8892A9AF437CCC38.TMP

        Filesize

        652B

        MD5

        d8a12afdc00686053ddc97680e637dac

        SHA1

        9e736044e7030ff0dbf8d2227185fd7777c3847c

        SHA256

        532af10f9f0586f6779962254b746f798ea81c224e4eaea63317610dd1667c52

        SHA512

        09ad1e711955d51d5d6c4c5091af139ecdc90a46bfa00c17d5ef01d5122d62d3dbbe5f695107a6f5acfc6a0be655ffd8edeb210fec370c649a5cf572bf7c1bcb

      • \??\c:\Users\Admin\AppData\Local\Temp\gh5i3ir3\gh5i3ir3.0.cs

        Filesize

        10KB

        MD5

        b5c3a2d03ff4c721192716f326c77dea

        SHA1

        6b754fd988ca58865674b711aba76d3c6b2c5693

        SHA256

        ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac

        SHA512

        d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248

      • \??\c:\Users\Admin\AppData\Local\Temp\gh5i3ir3\gh5i3ir3.cmdline

        Filesize

        204B

        MD5

        ed5d34286b311602428cd9321ec7d7d2

        SHA1

        015466ee179bbaf7ae44a6b023c4357e3373526a

        SHA256

        b9c62d76052ee00e673ad7cbf343a014c8effb16e4b6f304d8de946cb6983777

        SHA512

        c9ac7f1184b75db905a970f3c18757d199dd649926b1f4bc5ec4d32e1dd5b8644d570a2f29df7a00c25fbb874bdcba69db6081cd041f1b9a25bea579250daaae

      • memory/1876-13-0x00000284A31F0000-0x00000284A3200000-memory.dmp

        Filesize

        64KB

      • memory/1876-31-0x00007FFAC20B0000-0x00007FFAC2B71000-memory.dmp

        Filesize

        10.8MB

      • memory/1876-12-0x00007FFAC20B0000-0x00007FFAC2B71000-memory.dmp

        Filesize

        10.8MB

      • memory/1876-11-0x000002848AD70000-0x000002848AD92000-memory.dmp

        Filesize

        136KB

      • memory/1876-1-0x00007FFAC20B0000-0x00007FFAC2B71000-memory.dmp

        Filesize

        10.8MB

      • memory/1876-26-0x00000284A3200000-0x00000284A3208000-memory.dmp

        Filesize

        32KB

      • memory/1876-0-0x00007FFAC20B3000-0x00007FFAC20B5000-memory.dmp

        Filesize

        8KB

      • memory/2252-28-0x0000000000400000-0x0000000000704000-memory.dmp

        Filesize

        3.0MB

      • memory/2252-32-0x0000000005E40000-0x00000000063E4000-memory.dmp

        Filesize

        5.6MB

      • memory/2252-33-0x0000000005C90000-0x0000000005D22000-memory.dmp

        Filesize

        584KB

      • memory/2252-34-0x0000000005D60000-0x0000000005D6A000-memory.dmp

        Filesize

        40KB

      • memory/2252-37-0x0000000006B00000-0x0000000006B9C000-memory.dmp

        Filesize

        624KB

      • memory/2252-38-0x0000000006BA0000-0x0000000006C06000-memory.dmp

        Filesize

        408KB

      • memory/2252-39-0x0000000006F60000-0x0000000006F82000-memory.dmp

        Filesize

        136KB

      • memory/2252-40-0x0000000006F90000-0x00000000072E4000-memory.dmp

        Filesize

        3.3MB