Analysis

  • max time kernel
    74s
  • max time network
    80s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    28-10-2021 22:00

General

  • Target

    http://13.78.209.105/D/Servers/AsyncClient.exe

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

asyncmoney.duckdns.org:7829

asyncmoney.duckdns.org:7840

asyncmoney.duckdns.org:7841

asyncmoney.duckdns.org:7842

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

  • Async RAT payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://13.78.209.105/D/Servers/AsyncClient.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3704 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1328
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YT6ZDZWI\AsyncClient.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YT6ZDZWI\AsyncClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YT6ZDZWI\AsyncClient.exe
    MD5

    d4b8b8cfd3b479a8138cd750c58a7c82

    SHA1

    b96aa9a15e4076786b16edfef4b3a92d289a3cad

    SHA256

    1490f6303a675ded86c22841f87868c6f0867e922671e0426f499e46a72060d2

    SHA512

    388654ac3e7c550b1a350efab96d8c9f30450a02edfa3d91a902e915a4bdaee26d628ed2cd3f6dfbb9601ccf0a2feb0b06f098562ae384e88abbb3a05b9d1978

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YT6ZDZWI\AsyncClient.exe.201hpex.partial
    MD5

    d4b8b8cfd3b479a8138cd750c58a7c82

    SHA1

    b96aa9a15e4076786b16edfef4b3a92d289a3cad

    SHA256

    1490f6303a675ded86c22841f87868c6f0867e922671e0426f499e46a72060d2

    SHA512

    388654ac3e7c550b1a350efab96d8c9f30450a02edfa3d91a902e915a4bdaee26d628ed2cd3f6dfbb9601ccf0a2feb0b06f098562ae384e88abbb3a05b9d1978

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IKIYKQBT.cookie
    MD5

    e9149884b4e1c02884cd08fc2b6580b3

    SHA1

    f0a48778045859e8ae8b3b4c68dee8b961dcea25

    SHA256

    a1edf83592d45fc388b2924c1f8e0f47ed0734a882b2aa06dbf172398c40b7cf

    SHA512

    13b3d93fd641cde16b7be6d44e2d55732fbaa58c390640bfd21c3cb93b92d0f0d8fad1ee58cc0eefbf9dacb1bdeeda01113951055cfb7beab83199aeb223617b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\R540XI2Z.cookie
    MD5

    59092e8746ec3035eb15e68cd49572df

    SHA1

    d752647cebeed6ae6e6ea91ac8545ff7362386c9

    SHA256

    cd2802d8785d6c8cf46abf91d48a924ef96d178c4308e79883049c7e2d36b65a

    SHA512

    950a357e107343c3d4324c53d6ba74820aca3c7d216599f75409e2a761bc634ee598ee02726d0de8f89f2ca75abbe21e1a71c80b075cff5681d6af52ed9c0d77

  • memory/212-199-0x0000000004E90000-0x0000000004E91000-memory.dmp
    Filesize

    4KB

  • memory/212-195-0x0000000000000000-mapping.dmp
  • memory/1328-140-0x0000000000000000-mapping.dmp
  • memory/3704-142-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-149-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-125-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-127-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-128-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-129-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-131-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-132-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-134-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-135-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-136-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-137-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-138-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-123-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-141-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-115-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-144-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-145-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-147-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-124-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-150-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-151-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-155-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-156-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-157-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-163-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-164-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-165-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-166-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-167-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-168-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-172-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-174-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-122-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-121-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-120-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-119-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-117-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB

  • memory/3704-116-0x00007FFF23B50000-0x00007FFF23BBB000-memory.dmp
    Filesize

    428KB