Analysis

  • max time kernel
    88s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 12:21

General

  • Target

    Ntprfgupx-2.exe

  • Size

    1.8MB

  • MD5

    1237a749cdfe8065f70beb76026fbf58

  • SHA1

    9e9febe7441cfaa52135c32ef1827af10bdc81bf

  • SHA256

    819d812044fccc25692d6f0919850536d3486bdfdf296bea08ea3291fe1d425c

  • SHA512

    57217329975517c09c32c49be0da9c694a7492347c13024eef77203ee16d3caaba8e77235a991194bcab961071d7ff887a1e5501eafc234f52ee4f840d3e6166

  • SSDEEP

    49152:zGXOVDKuXtwIarveK9plB91K70myaigDmXI:ieVDx6IaaK9plBXO03xgDmXI

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Mutex

Aakn1515knAakn1515kn

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Async RAT payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ntprfgupx-2.exe
    "C:\Users\Admin\AppData\Local\Temp\Ntprfgupx-2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:2816
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:844

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/844-2486-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/844-2489-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/844-2488-0x0000000005680000-0x000000000571C000-memory.dmp

      Filesize

      624KB

    • memory/844-2487-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3764-171-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-133-0x0000000000300000-0x00000000004DA000-memory.dmp

      Filesize

      1.9MB

    • memory/3764-143-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-145-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-147-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-149-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-151-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-153-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-155-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-157-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-159-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-161-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-163-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-165-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-167-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-169-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-177-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-173-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-141-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-175-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-185-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-183-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-181-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-179-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-187-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-189-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-191-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-193-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-195-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-197-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-2478-0x0000000004F70000-0x0000000004F92000-memory.dmp

      Filesize

      136KB

    • memory/3764-2479-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

      Filesize

      64KB

    • memory/3764-2480-0x0000000005040000-0x00000000050A6000-memory.dmp

      Filesize

      408KB

    • memory/3764-2481-0x0000000031190000-0x0000000031222000-memory.dmp

      Filesize

      584KB

    • memory/3764-2482-0x00000000317E0000-0x0000000031D84000-memory.dmp

      Filesize

      5.6MB

    • memory/3764-139-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-137-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-135-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB

    • memory/3764-134-0x0000000004C50000-0x0000000004D1B000-memory.dmp

      Filesize

      812KB