Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f.ps1
Resource
win7-20241023-en
General
-
Target
51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f.ps1
-
Size
463KB
-
MD5
a0566a1037f123125a5a2ce8efcb166e
-
SHA1
09e1c8520bce65ba13c5bb14aad4f04e6cad6da3
-
SHA256
51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f
-
SHA512
cf80eb3483305b93c827c51fe422715af41d197cede82bd297ed8393ea5db66cc98279e0048f66992344e84b479e8db632d93a462905f5c8bc0786a0708b521f
-
SSDEEP
3072:JjHXlNuE+NPVFL2bUCUrNlKomLJVlCsspIF:JjqE+NPVFL2bUCUrNlKomLJVlCsspIF
Malware Config
Extracted
asyncrat
AWS | 3Losh
00000001
81.10.39.58:7077
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 18 3472 powershell.exe 20 3472 powershell.exe -
pid Process 3472 powershell.exe 2172 powershell.exe 1892 powershell.exe 2712 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org 18 api.ipify.org -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2172 set thread context of 2440 2172 powershell.exe 92 PID 1892 set thread context of 2180 1892 powershell.exe 106 PID 2712 set thread context of 2852 2712 powershell.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3472 powershell.exe 3472 powershell.exe 2172 powershell.exe 2172 powershell.exe 2440 aspnet_compiler.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 2712 powershell.exe 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3472 powershell.exe Token: SeIncreaseQuotaPrivilege 3472 powershell.exe Token: SeSecurityPrivilege 3472 powershell.exe Token: SeTakeOwnershipPrivilege 3472 powershell.exe Token: SeLoadDriverPrivilege 3472 powershell.exe Token: SeSystemProfilePrivilege 3472 powershell.exe Token: SeSystemtimePrivilege 3472 powershell.exe Token: SeProfSingleProcessPrivilege 3472 powershell.exe Token: SeIncBasePriorityPrivilege 3472 powershell.exe Token: SeCreatePagefilePrivilege 3472 powershell.exe Token: SeBackupPrivilege 3472 powershell.exe Token: SeRestorePrivilege 3472 powershell.exe Token: SeShutdownPrivilege 3472 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeSystemEnvironmentPrivilege 3472 powershell.exe Token: SeRemoteShutdownPrivilege 3472 powershell.exe Token: SeUndockPrivilege 3472 powershell.exe Token: SeManageVolumePrivilege 3472 powershell.exe Token: 33 3472 powershell.exe Token: 34 3472 powershell.exe Token: 35 3472 powershell.exe Token: 36 3472 powershell.exe Token: SeIncreaseQuotaPrivilege 3472 powershell.exe Token: SeSecurityPrivilege 3472 powershell.exe Token: SeTakeOwnershipPrivilege 3472 powershell.exe Token: SeLoadDriverPrivilege 3472 powershell.exe Token: SeSystemProfilePrivilege 3472 powershell.exe Token: SeSystemtimePrivilege 3472 powershell.exe Token: SeProfSingleProcessPrivilege 3472 powershell.exe Token: SeIncBasePriorityPrivilege 3472 powershell.exe Token: SeCreatePagefilePrivilege 3472 powershell.exe Token: SeBackupPrivilege 3472 powershell.exe Token: SeRestorePrivilege 3472 powershell.exe Token: SeShutdownPrivilege 3472 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeSystemEnvironmentPrivilege 3472 powershell.exe Token: SeRemoteShutdownPrivilege 3472 powershell.exe Token: SeUndockPrivilege 3472 powershell.exe Token: SeManageVolumePrivilege 3472 powershell.exe Token: 33 3472 powershell.exe Token: 34 3472 powershell.exe Token: 35 3472 powershell.exe Token: 36 3472 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2440 aspnet_compiler.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2440 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1532 4532 WScript.exe 86 PID 4532 wrote to memory of 1532 4532 WScript.exe 86 PID 1532 wrote to memory of 4248 1532 net.exe 88 PID 1532 wrote to memory of 4248 1532 net.exe 88 PID 4532 wrote to memory of 2236 4532 WScript.exe 89 PID 4532 wrote to memory of 2236 4532 WScript.exe 89 PID 2236 wrote to memory of 2172 2236 cmd.exe 91 PID 2236 wrote to memory of 2172 2236 cmd.exe 91 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 2172 wrote to memory of 2440 2172 powershell.exe 92 PID 4500 wrote to memory of 452 4500 WScript.exe 99 PID 4500 wrote to memory of 452 4500 WScript.exe 99 PID 452 wrote to memory of 532 452 net.exe 101 PID 452 wrote to memory of 532 452 net.exe 101 PID 4500 wrote to memory of 4908 4500 WScript.exe 102 PID 4500 wrote to memory of 4908 4500 WScript.exe 102 PID 4908 wrote to memory of 1892 4908 cmd.exe 104 PID 4908 wrote to memory of 1892 4908 cmd.exe 104 PID 1892 wrote to memory of 1376 1892 powershell.exe 105 PID 1892 wrote to memory of 1376 1892 powershell.exe 105 PID 1892 wrote to memory of 1376 1892 powershell.exe 105 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 1892 wrote to memory of 2180 1892 powershell.exe 106 PID 4952 wrote to memory of 400 4952 WScript.exe 116 PID 4952 wrote to memory of 400 4952 WScript.exe 116 PID 400 wrote to memory of 3020 400 net.exe 118 PID 400 wrote to memory of 3020 400 net.exe 118 PID 4952 wrote to memory of 3972 4952 WScript.exe 119 PID 4952 wrote to memory of 3972 4952 WScript.exe 119 PID 3972 wrote to memory of 2712 3972 cmd.exe 121 PID 3972 wrote to memory of 2712 3972 cmd.exe 121 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122 PID 2712 wrote to memory of 2852 2712 powershell.exe 122
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" session2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:4248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" session2⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:1376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" session2⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:3020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD581d91bab2fdd72436e4852d94ea7650d
SHA15652b3c46a0cf75a03859c5707f36fb08f5c631a
SHA25668a3392780a3c6219350a2ca51262a74a2a9d6a1ea84686f38d473f37d0588e1
SHA512df1e3da61c9657a7f0c0eac9ce610798421e138259ec2bf41063b8e8eb8e1c9e6d669aaba675ba16ccdceed1aa3f76b482893dc98f3d6b46cd48d61da7669268
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
1KB
MD532b5bb75b20cb77f102203c5c4a71d55
SHA1b06326869f513d570854cda05ca51deaa2ca5a2c
SHA25605b161df52113eb973ecb0f436aeb9544632b47628ffd8ab1ff451c52569d6f5
SHA512420598d26103fead96d699cf6fdf5c95f244dbee71b6173dde0a36e42981a028ab41852947f3dc64c3b3cc4da8e41ab898e31c4706b1f4f0b579aa8af2fcc841
-
Filesize
1KB
MD59704dd4f902d5613ddee53329d08e52b
SHA12b4075ba3dac45d60ac238293a15d3f381aed457
SHA256160886ef16b948c0d3e5e89bd81d371aa7cd33d89c3174dada178cb4deeeb13e
SHA512e9234f26d07f8c4681d5a269bca7721b803645ec20b81fc8d623ce35f97fd09869d9f4b2a8d7f6159ae2d43c36998ba2a42a3e031221ed546e430817c335d680
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD511e5bd60f47cabd544689686e90ec983
SHA1a0c50c6ce6fb1c76a49ad3b7473ae115a9473586
SHA256796359f255098ba6f1aeb601bee332c499f6480bf8268eba81c8afa2e406bf03
SHA5124c7e178fa8683d2e4f4e7876cb7564e81d209e459f91cc4dda45482f17ceacbe6c1fbc08dd77afec854f9c6d4e2882867a27786e88ca9785162c70130a5f938c
-
Filesize
453KB
MD5c898ca5977afbf542dbccf9bcd3fdec7
SHA103deac6e826609b94f92e202ae19058268adb3ac
SHA256d8527365ff27229d55b5033c6acedd6288ede1713ebd02d7e6d67c7949310074
SHA5129c56fab5e5c0f4d5d79b21e8ba17fc7835d176d300fb6af30809fc7c6ff97083d3ec0af0e93918ff58cc45f45ca0c2d9bc9d26ddc702aa3abfb96822c8250ffa
-
Filesize
4KB
MD56a982f2ddd0049ae0aeae977a423b777
SHA1b595d62a2d62817f0f2128d5587e2efac3bee8dc
SHA256119ca11e66b8d4a45cda8085ae6664b25fbffe0486b7080c4405254dda8166a7
SHA51244ae539ff8133189a0305cb8645fe37b7dbd11e737cf39ee4569ba3e13b0d31401f0fc3fbe827039687f3c987bd423e6a006436d93554b28c76f1f9e2db81da5