Overview
overview
7Static
static
7ASM-Guard/....1.exe
windows7-x64
7ASM-Guard/....1.exe
windows10-2004-x64
7AsStrongAs...ck.exe
windows7-x64
1AsStrongAs...ck.exe
windows10-2004-x64
1AsStrongAs...ib.dll
windows7-x64
1AsStrongAs...ib.dll
windows10-2004-x64
1CryptoObfu...or.exe
windows7-x64
1CryptoObfu...or.exe
windows10-2004-x64
7DotNetPatc...er.exe
windows7-x64
7DotNetPatc...er.exe
windows10-2004-x64
7DotNetPatc...er.dll
windows7-x64
1DotNetPatc...er.dll
windows10-2004-x64
1DotNetPatc...er.dll
windows7-x64
1DotNetPatc...er.dll
windows10-2004-x64
1DotNetPatc...ns.dll
windows7-x64
1DotNetPatc...ns.dll
windows10-2004-x64
1DotNetPatc...me.dll
windows7-x64
1DotNetPatc...me.dll
windows10-2004-x64
1DotNetPatc...ks.dll
windows7-x64
1DotNetPatc...ks.dll
windows10-2004-x64
1DotNetPatc...il.dll
windows7-x64
1DotNetPatc...il.dll
windows10-2004-x64
1DotNetPatc...ib.dll
windows7-x64
1DotNetPatc...ib.dll
windows10-2004-x64
1DotNetPatc...ib.dll
windows7-x64
1DotNetPatc...ib.dll
windows10-2004-x64
1DotNetPatc...ib.dll
windows7-x64
1DotNetPatc...ib.dll
windows10-2004-x64
1NET Reacto...t.html
windows7-x64
1NET Reacto...t.html
windows10-2004-x64
1NET Reacto...LP.exe
windows7-x64
4NET Reacto...LP.exe
windows10-2004-x64
5Analysis
-
max time kernel
179s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:49
Behavioral task
behavioral1
Sample
ASM-Guard/ASM.Guard.2.9.1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ASM-Guard/ASM.Guard.2.9.1.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
AsStrongAsFuck/AsStrongAsFuck.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
AsStrongAsFuck/AsStrongAsFuck.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
AsStrongAsFuck/dnlib.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
AsStrongAsFuck/dnlib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
CryptoObfuscator/CryptoObfuscator.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
CryptoObfuscator/CryptoObfuscator.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
DotNetPatcher4.6.6.7/DotNetPatcher.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
DotNetPatcher4.6.6.7/DotNetPatcher.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
DotNetPatcher4.6.6.7/Helper.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
DotNetPatcher4.6.6.7/Helper.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
DotNetPatcher4.6.6.7/Implementer.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
DotNetPatcher4.6.6.7/Implementer.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
DotNetPatcher4.6.6.7/Injections.dll
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
DotNetPatcher4.6.6.7/Injections.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
DotNetPatcher4.6.6.7/LoginTheme.dll
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
DotNetPatcher4.6.6.7/LoginTheme.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
DotNetPatcher4.6.6.7/Mono.Cecil.Rocks.dll
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
DotNetPatcher4.6.6.7/Mono.Cecil.Rocks.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
DotNetPatcher4.6.6.7/Mono.Cecil.dll
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
DotNetPatcher4.6.6.7/Mono.Cecil.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
DotNetPatcher4.6.6.7/SevenzipLib.dll
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
DotNetPatcher4.6.6.7/SevenzipLib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
DotNetPatcher4.6.6.7/Vestris.ResourceLib.dll
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
DotNetPatcher4.6.6.7/Vestris.ResourceLib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
DotNetPatcher4.6.6.7/dnlib.dll
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
DotNetPatcher4.6.6.7/dnlib.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
NET Reactor v6.9.0.0_fu11/Help/License Agreement.html
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
NET Reactor v6.9.0.0_fu11/Help/License Agreement.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
NET Reactor v6.9.0.0_fu11/Help/REACTOR_HELP.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
NET Reactor v6.9.0.0_fu11/Help/REACTOR_HELP.exe
Resource
win10v2004-20230915-en
General
-
Target
ASM-Guard/ASM.Guard.2.9.1.exe
-
Size
4.1MB
-
MD5
37616347c10d6f6623076e662b49f440
-
SHA1
b924cab04accb65219083b2d06a52bbb5db9c5fd
-
SHA256
4f792d5e32547cdbd6724cdf5fb4c6e4956c8f28fdc8be4a56f47b0964d393b1
-
SHA512
917f09979eda45b182a642d9422f4c02c1c41d9d887f8c45b3eeed53e3f97e450306455a4372d16fa537421f56f9f5c6435ad8830b84c3aa1fec2fce580f4256
-
SSDEEP
98304:1DMdmIG8JOPLIjwpbW+xPsFlguFWe5+Vvdo/Wj13Zu:1QFG8JoLIjArMs+Ot
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\ = "Protect in ASM Guard" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\command ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe\" \"%1\"" ASM.Guard.2.9.1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2924 ASM.Guard.2.9.1.exe 2924 ASM.Guard.2.9.1.exe -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\.asmg\ = "ASM_Guard" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell\ASM Guard ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell\ASM Guard\ = "Protect in ASM Guard" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe\" \"%1\"" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe\" \"%1\"" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\DefaultIcon ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell\ = "open" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell\open ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell\open\command ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile\shell\ASM Guard\command ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\ = "Protect in ASM Guard" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe" ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\exefile\shell\ASM Guard\command ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\.asmg ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard ASM.Guard.2.9.1.exe Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\dllfile ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\ = "ASM Guard project" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell\open\ = "Open" ASM.Guard.2.9.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\ASM_Guard\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ASM-Guard\\ASM.Guard.2.9.1.exe\" \"%1\"" ASM.Guard.2.9.1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 ASM.Guard.2.9.1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ASM-Guard\ASM.Guard.2.9.1.exe"C:\Users\Admin\AppData\Local\Temp\ASM-Guard\ASM.Guard.2.9.1.exe"1⤵
- Modifies system executable filetype association
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2924