Analysis

  • max time kernel
    171s
  • max time network
    265s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 21:28

General

  • Target

    desk.exe

  • Size

    500.0MB

  • MD5

    16314cacd74e109fc9ad1c5df2eb8664

  • SHA1

    3cc9bb0d38c78d3d9303ad08fc2a13a53ccfedf1

  • SHA256

    1a1585293a6ca4c99e44574d2162614f2cb25756f3363b65c36259b98f632b19

  • SHA512

    149b6792aa6d60b9998bd8053dc871722a8cb0f76293ad49daa7333ed37e5e5bb24c5b3c9d169f777f07c15fd03c6b975b2ea5dda0025bcd4936aa369eda9b2c

  • SSDEEP

    12288:U+16R2LddlvB2v25xRMru65uZEKG+uaUMVQQSsbCGe1f:U0JLddlvj5xyF5uZEKGaRVTSsb9+f

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Cracked By Hegaa

Botnet

XXNEWWXX

C2

webwdircetcc.sytes.net:3232

webazssc.sytes.net:3232

webazsswebc.sytes.net:3232

webwsetcc.sytes.net:3232

Mutex

中文翻译缅甸语翻译缅甸语

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\desk.exe
        "C:\Users\Admin\AppData\Local\Temp\desk.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Windows\SYSTEM32\notepad.exe
          notepad.exe
          3⤵
            PID:2016
        • C:\Windows\System32\notepad.exe
          C:\Windows\System32\notepad.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3380

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3380-4-0x0000024BE6F10000-0x0000024BE6F29000-memory.dmp

        Filesize

        100KB

      • memory/3380-7-0x0000024BE8A50000-0x0000024BE8A64000-memory.dmp

        Filesize

        80KB

      • memory/3380-8-0x00007FFA6BCA0000-0x00007FFA6C761000-memory.dmp

        Filesize

        10.8MB

      • memory/3380-10-0x0000024BE9430000-0x0000024BE9440000-memory.dmp

        Filesize

        64KB

      • memory/3380-9-0x0000024BE9430000-0x0000024BE9440000-memory.dmp

        Filesize

        64KB

      • memory/3380-11-0x00007FFA6BCA0000-0x00007FFA6C761000-memory.dmp

        Filesize

        10.8MB

      • memory/3380-12-0x0000024BE9430000-0x0000024BE9440000-memory.dmp

        Filesize

        64KB

      • memory/3380-13-0x0000024BE9430000-0x0000024BE9440000-memory.dmp

        Filesize

        64KB

      • memory/4980-0-0x00007FFA8AD50000-0x00007FFA8AF45000-memory.dmp

        Filesize

        2.0MB

      • memory/4980-2-0x0000020F86D60000-0x0000020F86DC0000-memory.dmp

        Filesize

        384KB

      • memory/4980-3-0x0000020F86E60000-0x0000020F86EBD000-memory.dmp

        Filesize

        372KB

      • memory/4980-6-0x0000020F86E60000-0x0000020F86EBD000-memory.dmp

        Filesize

        372KB