Analysis
-
max time kernel
554s -
max time network
870s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/04/2023, 05:35
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10-20230220-en
6 signatures
150 seconds
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
5b9e5723583eb31b9d67c46b2825d6bb
-
SHA1
44a867a74e714a77e0fc6eda42e9865370ba0937
-
SHA256
4dcb2fbc2fcfc15556b81e2b07f84427f80435b1b312fea8b18e688a565eac6e
-
SHA512
fade32705bd80dcdbbdeda9415ac3d7fdb1872803808f6ba000d365723642ed863ee70da38ab31906b0a83fb0aa84ea25ad50bf30a980b481a9791f95674d0ab
-
SSDEEP
768:nugSNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3i2usR0FiXOhqAm0BDZ/x:nugSNToTdQT2mKYDy3bCXSpsCFFqABdp
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:61288
146.70.165.10:61288
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_file
Microsoft Update.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1872-118-0x00000000000A0000-0x00000000000B2000-memory.dmp asyncrat behavioral1/memory/1872-127-0x00000000058A0000-0x00000000058C6000-memory.dmp asyncrat behavioral1/memory/1872-130-0x0000000006F10000-0x0000000006F32000-memory.dmp asyncrat behavioral1/memory/1872-134-0x0000000005670000-0x0000000005696000-memory.dmp asyncrat behavioral1/memory/1872-135-0x00000000001D0000-0x0000000000200000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Control Panel\International\Geo\Nation AsyncClient.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri AsyncClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1872 AsyncClient.exe