Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 02:18

General

  • Target

    7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6.ps1

  • Size

    1KB

  • MD5

    0cdc732f0ded614eb23c08213bcf1e04

  • SHA1

    0cbca39b7b1a0ec9b930c38c1c60d50feed74ee3

  • SHA256

    7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6

  • SHA512

    86c92258d18f25c97215c68cd4ef09b0c1433ea9de27c00247537ea8a7c187d4428b1cb151c785d5544f17da8ba9b138ef59efd3c7f7546240bf7ae5a5b29eb7

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6.ps1
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of SetThreadContext
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\z3etidzu\z3etidzu.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4348
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC2E2.tmp" "c:\Users\Admin\AppData\Local\Temp\z3etidzu\CSCA506FCA84C34AB695C1F45839692167.TMP"
        3⤵
          PID:3848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:1460
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1352

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESC2E2.tmp

        Filesize

        1KB

        MD5

        cfe593bc727a09ab9913455a919e6797

        SHA1

        a7fac16170da337c1e790c2269e6814e5149db0b

        SHA256

        50e6626c0a7e5fd47bb8e63a8ab9b99882b2295ad1f62e7f1d0fd44c7f348833

        SHA512

        33abbc545678d4536e9f0eccaed466eea20d186d28cf807e8c5da09b118192624ef2274b330b4b99f75581738c1655e09940f2b8b2f8ffa2d0f747eeaa38143a

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pjpwctmz.h5q.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\z3etidzu\z3etidzu.dll

        Filesize

        9KB

        MD5

        667e31033247bf4d6521de6d71a5a910

        SHA1

        d6498068fae45f2bb423d7254e7b47a9b02f8d31

        SHA256

        b7face27eebfed0c8e24e4807450b30ddd512238ad862411e02927318fcbdbc8

        SHA512

        44217507d7f589288854ff405162e0fdbc38edb64755c4e6d6160ea08cad80d3baa22fceb7a4d3ecda8d71ed90c9235753b24ec3f1fb2dc53ef262b2e7dd2b76

      • \??\c:\Users\Admin\AppData\Local\Temp\z3etidzu\CSCA506FCA84C34AB695C1F45839692167.TMP

        Filesize

        652B

        MD5

        2157e68c1221cf7f186822cb18d7733e

        SHA1

        9321d33807d6cdb800d004aa1ffcbafd22bde3fb

        SHA256

        60be87098c688c2ce830786e7713809737e6e9d76ad5f1afe98b6abd8c7575ab

        SHA512

        667e12531facfe918edb0689123130125c7d9fece8dfbdbea3c0f4aef72187df530d5c5d05bfaffef8009e431035914e54cb6baddb578913e65cceed4c333242

      • \??\c:\Users\Admin\AppData\Local\Temp\z3etidzu\z3etidzu.0.cs

        Filesize

        10KB

        MD5

        b5c3a2d03ff4c721192716f326c77dea

        SHA1

        6b754fd988ca58865674b711aba76d3c6b2c5693

        SHA256

        ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac

        SHA512

        d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248

      • \??\c:\Users\Admin\AppData\Local\Temp\z3etidzu\z3etidzu.cmdline

        Filesize

        204B

        MD5

        09b6e070c292e3804264c25ca35446d0

        SHA1

        3a132de62d155d09d777f1f6c0c2a044e490bb35

        SHA256

        1fd3cb7323401546463f08ab7967aaa73dfc78b9c35157aa20ec0c65db9260b5

        SHA512

        64777fc5a51022546c5922b29bb53650bbe993b4ac09ab56ab69f178d622417d474a56545bc8815718d587282f31cd9b29666f2fd068d30f20c1f3a7c1acba47

      • memory/1352-33-0x0000000005570000-0x0000000005602000-memory.dmp

        Filesize

        584KB

      • memory/1352-32-0x0000000005770000-0x0000000005D14000-memory.dmp

        Filesize

        5.6MB

      • memory/1352-38-0x0000000006880000-0x0000000006BD4000-memory.dmp

        Filesize

        3.3MB

      • memory/1352-37-0x0000000006850000-0x0000000006872000-memory.dmp

        Filesize

        136KB

      • memory/1352-36-0x00000000062E0000-0x0000000006346000-memory.dmp

        Filesize

        408KB

      • memory/1352-35-0x0000000006240000-0x00000000062DC000-memory.dmp

        Filesize

        624KB

      • memory/1352-28-0x0000000000400000-0x0000000000704000-memory.dmp

        Filesize

        3.0MB

      • memory/1352-34-0x0000000005500000-0x000000000550A000-memory.dmp

        Filesize

        40KB

      • memory/4940-11-0x00007FFCB63E0000-0x00007FFCB6EA1000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-0-0x00007FFCB63E3000-0x00007FFCB63E5000-memory.dmp

        Filesize

        8KB

      • memory/4940-31-0x00007FFCB63E0000-0x00007FFCB6EA1000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-1-0x0000029A503B0000-0x0000029A503D2000-memory.dmp

        Filesize

        136KB

      • memory/4940-13-0x0000029A503A0000-0x0000029A503B0000-memory.dmp

        Filesize

        64KB

      • memory/4940-26-0x0000029A50820000-0x0000029A50828000-memory.dmp

        Filesize

        32KB

      • memory/4940-12-0x00007FFCB63E0000-0x00007FFCB6EA1000-memory.dmp

        Filesize

        10.8MB