Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 18:40

General

  • Target

    6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601.exe

  • Size

    765KB

  • MD5

    ff2641ce33fd64ca3bcdb8f95956ccfc

  • SHA1

    a4b0b0b09d1952f49600fed2b82c15e8452c515d

  • SHA256

    6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601

  • SHA512

    49197ece1e9179326a833cb3a02d6dbfd0fda36dc09bd14a2fa794f735520ac58124626a481a64f4c0a6c733d3cf692f793aa857dffbe662eab9116dd3817038

  • SSDEEP

    1536:oC/6GStcxcG+1SwGp7FUcETgrggggEE2vBgcrZ+HsaJ7FDwwoNGkNecQeRSHcp3z:

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

dhayan.ip-dynamic.com:6606

dhayan.ip-dynamic.com:7707

dhayan.ip-dynamic.com:8808

192.168.1.192:6606

192.168.1.192:7707

192.168.1.192:8808

Mutex

kfjgkmlkgf4g516d51fg54r1eg651fv65d1g65sda1g616g51f6g51rg89a7

Attributes
  • delay

    3

  • install

    false

  • install_file

    tidore update crack.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Async RAT payload 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601.exe
    "C:\Users\Admin\AppData\Local\Temp\6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601.exe
      "C:\Users\Admin\AppData\Local\Temp\6af98c9c6ad382f3dddff52c8de96e2f831d0dbb0f1ab0f9a9457ba58d538601.exe"
      2⤵
        PID:3208

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3208-135-0x0000000000000000-mapping.dmp
    • memory/3208-136-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/4860-132-0x0000000000E20000-0x0000000000EE2000-memory.dmp
      Filesize

      776KB

    • memory/4860-133-0x0000000005840000-0x00000000058DC000-memory.dmp
      Filesize

      624KB

    • memory/4860-134-0x0000000005F90000-0x0000000006534000-memory.dmp
      Filesize

      5.6MB