Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 05:27

General

  • Target

    Image_Of_Victim.exe

  • Size

    1.9MB

  • MD5

    f1878e41af327064496e57f50d35395d

  • SHA1

    b426d39e6928556a2b58d9147c3254b8fa6009a4

  • SHA256

    373834225a126abde8256049e073b8e07bd06c7563f929783f441a1a63a88d1b

  • SHA512

    ff28bbd0f3c7b04ba93f024d356cee092f14c3040b968ebae31bdd9116ed8762aadcec3ac3af3e06238a787ef87b5031d29acf708640c52ac80f55fdfcd89fdd

  • SSDEEP

    49152:C5IoVKMQfTCFbMmHI6jduMG+XtbNztOsrStQ0pDWa:C5IoAMQfIr++dpztpStFJ

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

tienMonkey-40774.portmap.io:40774

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Image_Of_Victim.exe
    "C:\Users\Admin\AppData\Local\Temp\Image_Of_Victim.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\nonono.exe
      "C:\nonono.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1344
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:1792
          • C:\Windows\SysWOW64\netsh.exe
            netsh wlan show profile
            4⤵
              PID:1148
            • C:\Windows\SysWOW64\findstr.exe
              findstr All
              4⤵
                PID:1048
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1132
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                4⤵
                  PID:1016
                • C:\Windows\SysWOW64\netsh.exe
                  netsh wlan show networks mode=bssid
                  4⤵
                    PID:660
              • C:\Client.exe
                "C:\Client.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1804
            • C:\Windows\SysWOW64\DllHost.exe
              C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
              1⤵
              • Suspicious use of FindShellTrayWindow
              PID:1080
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1680

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Defense Evasion

            Install Root Certificate

            1
            T1130

            Modify Registry

            1
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Discovery

            System Information Discovery

            2
            T1082

            Query Registry

            1
            T1012

            Collection

            Data from Local System

            1
            T1005

            Email Collection

            1
            T1114

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Client.exe
              Filesize

              63KB

              MD5

              bf1e0b700f4955c1bf6ff3d5cd010658

              SHA1

              6919b4a8c0443b02846717e0764e7052b34c00c2

              SHA256

              ce44ab513606e6ba64fee7a9f5d5cd236b57dc856374578dca043d84e00d8541

              SHA512

              c6168ee1ceb98c3eca66b6aa1f5503849dc94e357da016dd5a1a6697337a68fc57bc3d4cc83dbdb74b4ed2b959a0b1099c18e93470db53d339bfbe0858b20844

            • C:\Client.exe
              Filesize

              63KB

              MD5

              bf1e0b700f4955c1bf6ff3d5cd010658

              SHA1

              6919b4a8c0443b02846717e0764e7052b34c00c2

              SHA256

              ce44ab513606e6ba64fee7a9f5d5cd236b57dc856374578dca043d84e00d8541

              SHA512

              c6168ee1ceb98c3eca66b6aa1f5503849dc94e357da016dd5a1a6697337a68fc57bc3d4cc83dbdb74b4ed2b959a0b1099c18e93470db53d339bfbe0858b20844

            • C:\Desktop.jpg
              Filesize

              162KB

              MD5

              773ecd18678795d7378e760fee974ca3

              SHA1

              1fc418f98c9b4c1757c593bc51fc8c6b45bf6d95

              SHA256

              72a84e420b0db282102471c1a6fff6e87073ed7a4dcc0a83501a91d9eacbf9c9

              SHA512

              1d58295b00d3e25432f3a9306c214fed927f8da78a5f047fefe054fd21b7fba4eee51f0d526eb543b6f08c1cd080c73e4d9ef56379c7c320a3b69187557d35f8

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
              Filesize

              60KB

              MD5

              d15aaa7c9be910a9898260767e2490e1

              SHA1

              2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

              SHA256

              f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

              SHA512

              7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              01600f12daf868030f79edba1d3c0c85

              SHA1

              28019f2fe28cc034e1243fc21d866692b30eb89e

              SHA256

              ab54827c76de0f1290a48bc7451cd1fde68e6724e21d4d9fae2a0eb4692b7704

              SHA512

              f791bd06571ee089299022d19cb82e99b836b237d24d5150c66750db1f9aa3452315594fe4909dbc2bb30164f567f6a9d95cd16d0bc4168e4756b1a575cc59a2

            • C:\nonono.exe
              Filesize

              1.5MB

              MD5

              174800448060da1f551c0e234d0337f6

              SHA1

              5c395ac0840c2abba7e18afa1080b22a8bfc5d12

              SHA256

              6be7871b1acc611b7703d1c0441e1cefb0024a5cde20bbcf9406fd8296e3b690

              SHA512

              0ff91582a3d89ba03f76ca845aec9dfd540d17d9f34a5935b71a947e89e716f9cb3af2e8302bad68be48a6644b7ac4812945759134fcf17bc3d196b70d83ca2a

            • C:\nonono.exe
              Filesize

              1.5MB

              MD5

              174800448060da1f551c0e234d0337f6

              SHA1

              5c395ac0840c2abba7e18afa1080b22a8bfc5d12

              SHA256

              6be7871b1acc611b7703d1c0441e1cefb0024a5cde20bbcf9406fd8296e3b690

              SHA512

              0ff91582a3d89ba03f76ca845aec9dfd540d17d9f34a5935b71a947e89e716f9cb3af2e8302bad68be48a6644b7ac4812945759134fcf17bc3d196b70d83ca2a

            • memory/660-73-0x0000000000000000-mapping.dmp
            • memory/1016-72-0x0000000000000000-mapping.dmp
            • memory/1048-69-0x0000000000000000-mapping.dmp
            • memory/1132-71-0x0000000000000000-mapping.dmp
            • memory/1148-68-0x0000000000000000-mapping.dmp
            • memory/1344-59-0x0000000001210000-0x0000000001394000-memory.dmp
              Filesize

              1.5MB

            • memory/1344-76-0x0000000004DA5000-0x0000000004DB6000-memory.dmp
              Filesize

              68KB

            • memory/1344-77-0x0000000005FE0000-0x000000000605A000-memory.dmp
              Filesize

              488KB

            • memory/1344-78-0x0000000005AD0000-0x0000000005B80000-memory.dmp
              Filesize

              704KB

            • memory/1344-55-0x0000000000000000-mapping.dmp
            • memory/1344-81-0x0000000006380000-0x0000000006402000-memory.dmp
              Filesize

              520KB

            • memory/1344-82-0x0000000004DA5000-0x0000000004DB6000-memory.dmp
              Filesize

              68KB

            • memory/1680-75-0x000007FEFC011000-0x000007FEFC013000-memory.dmp
              Filesize

              8KB

            • memory/1720-54-0x00000000757A1000-0x00000000757A3000-memory.dmp
              Filesize

              8KB

            • memory/1792-67-0x0000000000000000-mapping.dmp
            • memory/1804-64-0x0000000000DC0000-0x0000000000DD6000-memory.dmp
              Filesize

              88KB

            • memory/1804-60-0x0000000000000000-mapping.dmp
            • memory/1992-66-0x0000000000000000-mapping.dmp