Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2025, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.ps1
Resource
win7-20241023-en
General
-
Target
0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.ps1
-
Size
438KB
-
MD5
674301ae02422ceb065a4174c7b9113a
-
SHA1
ba0b9c514114aa9cc8eed504c770a4f9da0c5674
-
SHA256
0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e
-
SHA512
aa70aa019b196ea338d5cd97f4b5296050e696a5a97b0ed4c4fbd4a23dc9e734fcd8cb56314c04814ebae2ec07645d86e536453fabb9dd3c4af13c6f8870f187
-
SSDEEP
1536:TjdW/z20+u4dXNR8WrlDnnlVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dv:TjYw7Ev1P4RtluJs
Malware Config
Extracted
asyncrat
AWS | 3Losh
Fox_Mado
0000_000
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/r3hJ4btd
Signatures
-
Asyncrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 29 IoCs
flow ioc 67 pastebin.com 15 pastebin.com 43 pastebin.com 49 pastebin.com 53 pastebin.com 54 pastebin.com 60 pastebin.com 14 pastebin.com 39 pastebin.com 42 pastebin.com 61 pastebin.com 18 pastebin.com 70 pastebin.com 64 pastebin.com 41 pastebin.com 44 pastebin.com 45 pastebin.com 50 pastebin.com 62 pastebin.com 63 pastebin.com 19 pastebin.com 25 pastebin.com 26 pastebin.com 69 pastebin.com 51 pastebin.com 68 pastebin.com 52 pastebin.com 65 pastebin.com 66 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 2412 3484 powershell.exe 83 -
pid Process 3484 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3484 powershell.exe 3484 powershell.exe 2412 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 2412 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83 PID 3484 wrote to memory of 2412 3484 powershell.exe 83
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\0cfa73172ff58fb401536620b3e2da2f7eb0a837043c02cbfc7d2edb8c00fe0e.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82