Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 07:59

General

  • Target

    d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c.exe

  • Size

    181KB

  • MD5

    5364393136838840f2d0ab8ce5e72b9a

  • SHA1

    505e9e8d40701e1e0afad2708d5077fbc430790a

  • SHA256

    d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c

  • SHA512

    60256c3d52a772ba26fca6e9e3851404b194612c9867ac1ab7faa750c835b2e566c4447393cdcf1ee2714b19c16e0f7011443bd756bc23c3c037907d5d044106

  • SSDEEP

    3072:0wPld991wOh7QRF53UKnR5yERAK9KfObAeWHkrh86yFOB2ZoIF5kFb67kchJj6Ep:0wtnN7Qx31mAAen86ysB2J5oUkcXhwS

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

198.37.108.208:5555

Mutex

byvbrkzxfqk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c.exe
    "C:\Users\Admin\AppData\Local\Temp\d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c.exe
      C:\Users\Admin\AppData\Local\Temp\d4bc68f94c9ee31a47ea846e8584fbb778fe5108d354b026672e4cc595f5610c.exe None
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    60fe01df86be2e5331b0cdbe86165686

    SHA1

    2a79f9713c3f192862ff80508062e64e8e0b29bd

    SHA256

    c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

    SHA512

    ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7244112A23658996B30F276F5B84FA23

    Filesize

    503B

    MD5

    86d8cf00b28d1607c1675b7794fde179

    SHA1

    d9d3fa18e80bd3d9d0f175536137a90a032e97ea

    SHA256

    eba7058424e0f12184a97130f6160a19d402a5618ea5045f2535b2df622ddfc0

    SHA512

    de06a243f9433dac60e190bb46abb78ef8090f317b2a683b724457676eee157694c56c781f6e902977247ebe403bc3e2551a350fcfc00a9fb0fa3a334392af35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    7e9a9db11b1b9d90d45d646c35f1d31d

    SHA1

    e7c9da8fa5b32ed135cd4f7e0080b6965a9b1d0c

    SHA256

    49e9db644680f9e9ab351e405b7d44ae2c6a4d12f2cdef4e83165a6d5e2ac287

    SHA512

    5d232cf9d45a24bdd1b282e602067e79e941d954428d652a2d20871b5554b379314e826307a041b24b9eb7b01766b05299022e962b7225eb89041487f25b6e91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7244112A23658996B30F276F5B84FA23

    Filesize

    548B

    MD5

    3fe19c1b379db29db095196130d85d39

    SHA1

    97720eff02e9698c821bc12165c149f175d24161

    SHA256

    964416c01e7db81284c8ced199149dc558281fbed3fd5b53cfea07aa278e8965

    SHA512

    13d1f9582e76a6b66212ed66d6926862550ee02b52e9f359ef4e60c5e0168b6c63f6724fda0b2a13aa27a8b398a83474aeba8c82504a955033a3006400999272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b22f95b6d531a358962c16b829917e4c

    SHA1

    031c2ca02b813184b75610ca4d91a6a8632ef215

    SHA256

    5e235d85b9bafd0e94ad84cc6d7021361fb6c9ceaf7837d533cd13ce529a4700

    SHA512

    7c644114fce7fdd6049f44b6f25932155d46d15a422bae0b70040e47d48bf4148d6b7759d793a6325c0cb68cacbcb9168ae031fb053659819c7b875e961925ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7f900bec1cf707871cff5cf596d392d7

    SHA1

    af97a1c1d434c335aea76283a55e61be2a5a1769

    SHA256

    e99659e8e71c9bba148a4e4d1b5a84283043bfdcbec14f37107a7c811297d5e4

    SHA512

    6cf11b0d3f61b4e8e4c83889b74c498da47f23c0b47f173a4d720c892523366ceabcf5f4e5ba6b0b474e1d7cce989a092efd0f496723f2b4588d5c78bbdb5913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8207a52db302a4bc7fbee0f27b30a175

    SHA1

    56a9906351a2ff87c9854c37b4121458f1a6a4eb

    SHA256

    6676152c5377b9b2fd85c4b6d4cd8bfbe239d9513180663f3d10bded1c8e9b52

    SHA512

    da02ba1bda11e3b972adb928fae3c8f99f8fb6449bb956ed299721e4211f6e5d2fbeb6e1e38f4881867fb8f7a98569abd51ce13ccb62f26c608b9c1bab909cb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    0ccde26424f8d2adcf230045f874e3e1

    SHA1

    a79cc324b111eec0a5bc7ef0579e82da8785c1e7

    SHA256

    2f7c637166c46cd7cf8057c733c2f4c34fe27e29bb1c5a608a7fcec5b147f889

    SHA512

    1ab8fa6a1804fd4042ffdb05dce213002fcaa5a02a45f0322ee8c9a4512dafde137364bae9628182b472f76785c5e4c5cb84b819a0561248ade1f9ec91500d86

  • C:\Users\Admin\AppData\Local\Temp\CabF9CC.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarFA2C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\44GD13E8.txt

    Filesize

    833B

    MD5

    42df0a8125eff3187ebaac7ed487d51e

    SHA1

    f4496bc81ff1c666ac5137dcef451b1682a6ba77

    SHA256

    fbcc066d77ff9f58075d05a961c1b20aa6d328b5c7bca5f60b45e26a7a37c6fa

    SHA512

    419a31ddda044657f9cdf7ce4cfe5fd5751c55e513535b46f5c7f5ed5a49dd86b50cb22c2b6054b4b074b7eef6d1ce69181766a4d6395056b7f329876a0733f4

  • memory/936-142-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/936-133-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/936-134-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/936-135-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/936-137-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/936-139-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/936-144-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/1956-141-0x0000000002BA0000-0x0000000002BFF000-memory.dmp

    Filesize

    380KB

  • memory/1956-132-0x0000000002BA0000-0x0000000002BFF000-memory.dmp

    Filesize

    380KB

  • memory/1956-131-0x0000000002BA0000-0x0000000002BFF000-memory.dmp

    Filesize

    380KB

  • memory/2372-90-0x0000000002200000-0x000000000225F000-memory.dmp

    Filesize

    380KB

  • memory/2372-89-0x0000000002200000-0x000000000225F000-memory.dmp

    Filesize

    380KB