Analysis

  • max time kernel
    70s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2023 21:04

General

  • Target

    c90ba430608e000e7b270f5b5157111ee4760fce3269084b5f2b46efd48cf577.exe

  • Size

    1.9MB

  • MD5

    171da24c24a495819291b45e99f2cb0e

  • SHA1

    6483d9c80da93eea0e84516e371c91336eaef681

  • SHA256

    48c368d7fdacb97f86acb10aee2115276ad56c7e8b470875f641cfdf0303a5fa

  • SHA512

    33779da0ecea8bfe19b7ec610b6297aed5e58e41ab367e54994d23a02d8ddb15d184a9535b4c20a0291f72252a60a60d8d4c8811ab37c0f5c84b85ec48961365

  • SSDEEP

    49152:qbIkVpX0sZ2XrYKSGsWm8JCdybPsaDGlI1f+ROJEnJoi36HNqbeqxq:xNqbJxq

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Game

C2

84.54.50.51:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c90ba430608e000e7b270f5b5157111ee4760fce3269084b5f2b46efd48cf577.exe
    "C:\Users\Admin\AppData\Local\Temp\c90ba430608e000e7b270f5b5157111ee4760fce3269084b5f2b46efd48cf577.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Windows \System32\ex.bat""
      2⤵
        PID:1360
        • C:\Windows \System32\printui.exe
          "C:\Windows \System32\printui.exe"
          3⤵
          • Executes dropped EXE
          PID:1844
        • C:\Windows \System32\printui.exe
          "C:\Windows \System32\printui.exe"
          3⤵
          • Executes dropped EXE
          PID:1660
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1764

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      87be0284864aba5478c5f62d93c021fd

      SHA1

      edf7166b2f43cb858a0d23a2450e49cd6eb4a634

      SHA256

      f86cd5c17fa397c36116ba4481436040472a2b5e10865e3a3ed909c2b625a8a5

      SHA512

      627dbf4c01d6d315f8c6eae03e0a460aa80853f5d6b8a7e6a5f29e317dd1be90de9518d0c88040650d0f86caf0a91e60dce4cc9a6cf0211b62fd2d54d5e50aac

    • C:\Users\Admin\AppData\Local\Temp\CabAAE0.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Windows \System32\ex.bat
      Filesize

      49B

      MD5

      544314fad7b74a93139a263de3a250d8

      SHA1

      79e2b93d4f847f61ccd4831df1dcd3d2a1b4ef0a

      SHA256

      b74d0dc9c867a70c050b2e23758b197c613c588a6403f7410fe87b30f37eb436

      SHA512

      458bb62f3ce779a963925b7beaba78c025c87ca801b84315680fb99ea23e6bdba12564ae7015baeda7eca14757a7c4bf290dd369735faa8f42d3b54cbb4b6fa0

    • C:\Windows \System32\ex.bat
      Filesize

      49B

      MD5

      544314fad7b74a93139a263de3a250d8

      SHA1

      79e2b93d4f847f61ccd4831df1dcd3d2a1b4ef0a

      SHA256

      b74d0dc9c867a70c050b2e23758b197c613c588a6403f7410fe87b30f37eb436

      SHA512

      458bb62f3ce779a963925b7beaba78c025c87ca801b84315680fb99ea23e6bdba12564ae7015baeda7eca14757a7c4bf290dd369735faa8f42d3b54cbb4b6fa0

    • C:\Windows \System32\printui.exe
      Filesize

      62KB

      MD5

      2fc3530f3e05667f8240fc77f7486e7e

      SHA1

      c52cc219886f29e5076ced98d6483e28fc5cc3e0

      SHA256

      ac75af591c08442ea453eb92f6344e930585d912894e9323db922bcd9edf4cd1

      SHA512

      ef78de6a114885b55806323f09d8bc24609966d29a31c2a5ae6ad93d1f0d584d29418ba76ca2f235ed30ad8ae2c91f552c15487c559e0411e978d397c82f7046

    • C:\Windows \System32\printui.exe
      Filesize

      62KB

      MD5

      2fc3530f3e05667f8240fc77f7486e7e

      SHA1

      c52cc219886f29e5076ced98d6483e28fc5cc3e0

      SHA256

      ac75af591c08442ea453eb92f6344e930585d912894e9323db922bcd9edf4cd1

      SHA512

      ef78de6a114885b55806323f09d8bc24609966d29a31c2a5ae6ad93d1f0d584d29418ba76ca2f235ed30ad8ae2c91f552c15487c559e0411e978d397c82f7046

    • C:\Windows \System32\printui.exe
      Filesize

      62KB

      MD5

      2fc3530f3e05667f8240fc77f7486e7e

      SHA1

      c52cc219886f29e5076ced98d6483e28fc5cc3e0

      SHA256

      ac75af591c08442ea453eb92f6344e930585d912894e9323db922bcd9edf4cd1

      SHA512

      ef78de6a114885b55806323f09d8bc24609966d29a31c2a5ae6ad93d1f0d584d29418ba76ca2f235ed30ad8ae2c91f552c15487c559e0411e978d397c82f7046

    • memory/1764-110-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1764-112-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1764-114-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1764-115-0x0000000004B80000-0x0000000004BC0000-memory.dmp
      Filesize

      256KB

    • memory/1764-134-0x0000000004B80000-0x0000000004BC0000-memory.dmp
      Filesize

      256KB