Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 02:39

General

  • Target

    51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f.ps1

  • Size

    463KB

  • MD5

    a0566a1037f123125a5a2ce8efcb166e

  • SHA1

    09e1c8520bce65ba13c5bb14aad4f04e6cad6da3

  • SHA256

    51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f

  • SHA512

    cf80eb3483305b93c827c51fe422715af41d197cede82bd297ed8393ea5db66cc98279e0048f66992344e84b479e8db632d93a462905f5c8bc0786a0708b521f

  • SSDEEP

    3072:JjHXlNuE+NPVFL2bUCUrNlKomLJVlCsspIF:JjqE+NPVFL2bUCUrNlKomLJVlCsspIF

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

00000001

C2

81.10.39.58:7077

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\51c2ce9149de3db70b215296b809528da5b3adbf79d8dcbd67d24e7f4cbbf28f.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3472
  • C:\Windows\System32\WScript.exe
    C:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\System32\net.exe
      "C:\Windows\System32\net.exe" session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4248
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2172
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2440
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Windows\System32\net.exe
        "C:\Windows\System32\net.exe" session
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          3⤵
            PID:532
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4908
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              4⤵
                PID:1376
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2180
        • C:\Windows\System32\WScript.exe
          C:\Windows\System32\WScript.exe "C:\Users\Public\Music\1asrjDI783.vbs"
          1⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4952
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" session
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:400
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              3⤵
                PID:3020
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Music\1asrjDI783.bat" "
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& 'C:\Users\Public\Music\1asrjDI783.ps1'"
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2852

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            81d91bab2fdd72436e4852d94ea7650d

            SHA1

            5652b3c46a0cf75a03859c5707f36fb08f5c631a

            SHA256

            68a3392780a3c6219350a2ca51262a74a2a9d6a1ea84686f38d473f37d0588e1

            SHA512

            df1e3da61c9657a7f0c0eac9ce610798421e138259ec2bf41063b8e8eb8e1c9e6d669aaba675ba16ccdceed1aa3f76b482893dc98f3d6b46cd48d61da7669268

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aspnet_compiler.exe.log

            Filesize

            425B

            MD5

            4eaca4566b22b01cd3bc115b9b0b2196

            SHA1

            e743e0792c19f71740416e7b3c061d9f1336bf94

            SHA256

            34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

            SHA512

            bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            32b5bb75b20cb77f102203c5c4a71d55

            SHA1

            b06326869f513d570854cda05ca51deaa2ca5a2c

            SHA256

            05b161df52113eb973ecb0f436aeb9544632b47628ffd8ab1ff451c52569d6f5

            SHA512

            420598d26103fead96d699cf6fdf5c95f244dbee71b6173dde0a36e42981a028ab41852947f3dc64c3b3cc4da8e41ab898e31c4706b1f4f0b579aa8af2fcc841

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            9704dd4f902d5613ddee53329d08e52b

            SHA1

            2b4075ba3dac45d60ac238293a15d3f381aed457

            SHA256

            160886ef16b948c0d3e5e89bd81d371aa7cd33d89c3174dada178cb4deeeb13e

            SHA512

            e9234f26d07f8c4681d5a269bca7721b803645ec20b81fc8d623ce35f97fd09869d9f4b2a8d7f6159ae2d43c36998ba2a42a3e031221ed546e430817c335d680

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vbg23yws.2h1.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Public\Music\1asrjDI783.bat

            Filesize

            2KB

            MD5

            11e5bd60f47cabd544689686e90ec983

            SHA1

            a0c50c6ce6fb1c76a49ad3b7473ae115a9473586

            SHA256

            796359f255098ba6f1aeb601bee332c499f6480bf8268eba81c8afa2e406bf03

            SHA512

            4c7e178fa8683d2e4f4e7876cb7564e81d209e459f91cc4dda45482f17ceacbe6c1fbc08dd77afec854f9c6d4e2882867a27786e88ca9785162c70130a5f938c

          • C:\Users\Public\Music\1asrjDI783.ps1

            Filesize

            453KB

            MD5

            c898ca5977afbf542dbccf9bcd3fdec7

            SHA1

            03deac6e826609b94f92e202ae19058268adb3ac

            SHA256

            d8527365ff27229d55b5033c6acedd6288ede1713ebd02d7e6d67c7949310074

            SHA512

            9c56fab5e5c0f4d5d79b21e8ba17fc7835d176d300fb6af30809fc7c6ff97083d3ec0af0e93918ff58cc45f45ca0c2d9bc9d26ddc702aa3abfb96822c8250ffa

          • C:\Users\Public\Music\1asrjDI783.vbs

            Filesize

            4KB

            MD5

            6a982f2ddd0049ae0aeae977a423b777

            SHA1

            b595d62a2d62817f0f2128d5587e2efac3bee8dc

            SHA256

            119ca11e66b8d4a45cda8085ae6664b25fbffe0486b7080c4405254dda8166a7

            SHA512

            44ae539ff8133189a0305cb8645fe37b7dbd11e737cf39ee4569ba3e13b0d31401f0fc3fbe827039687f3c987bd423e6a006436d93554b28c76f1f9e2db81da5

          • memory/2172-31-0x0000020802600000-0x000002080260C000-memory.dmp

            Filesize

            48KB

          • memory/2440-35-0x0000000005930000-0x0000000005ED4000-memory.dmp

            Filesize

            5.6MB

          • memory/2440-37-0x0000000005530000-0x000000000553A000-memory.dmp

            Filesize

            40KB

          • memory/2440-36-0x0000000005560000-0x00000000055F2000-memory.dmp

            Filesize

            584KB

          • memory/2440-32-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/3472-18-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-38-0x00007FFB66543000-0x00007FFB66545000-memory.dmp

            Filesize

            8KB

          • memory/3472-39-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-0-0x00007FFB66543000-0x00007FFB66545000-memory.dmp

            Filesize

            8KB

          • memory/3472-16-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-53-0x000001DCE0630000-0x000001DCE07F2000-memory.dmp

            Filesize

            1.8MB

          • memory/3472-54-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-55-0x000001DCE0D30000-0x000001DCE1258000-memory.dmp

            Filesize

            5.2MB

          • memory/3472-11-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-58-0x00007FFB66540000-0x00007FFB67001000-memory.dmp

            Filesize

            10.8MB

          • memory/3472-6-0x000001DCDFED0000-0x000001DCDFEF2000-memory.dmp

            Filesize

            136KB