Resubmissions

24/10/2023, 12:00

231024-n6mgdacg4s 10

24/10/2023, 11:52

231024-n1sq7see73 10

24/10/2023, 11:33

231024-nnxjmace71 10

24/10/2023, 11:30

231024-nl9feace6y 10

24/10/2023, 11:27

231024-nkf3gace5v 10

24/10/2023, 09:15

231024-k73m7sdg27 10

Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2023, 12:00

General

  • Target

    rat.exe

  • Size

    512KB

  • MD5

    738c07f22ff7922d8fcff5ba6555dbb3

  • SHA1

    86a08e0cb6b92b08d358c75e47dd5325b4aba323

  • SHA256

    7a83115ab46ba6a3c237d78f32bd3386ff4d4d7cd7b06ad731fe8071b2246278

  • SHA512

    c49a900d0165f56cc513c6e4e6551a69f3b49c8c0a9719ac925c6004b69554540999d1f3c9d63c397564e6ec67bb65cc31fa6e0ff9c2685a325fea7c8c0868dd

  • SSDEEP

    3072:7HivS2XIxjLnBnbmOKIudTziZ3w2OAGzCZ44Lz/w:LxvnBJh+T63wZzCZ44Lzw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat.exe
    "C:\Users\Admin\AppData\Local\Temp\rat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2220
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\system32\netsh.exe
      netsh trace start capture=yes tracefile=C:\file.etl
      2⤵
        PID:2592
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2568
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1d4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1792

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2220-0-0x000000013FF10000-0x000000013FF5C000-memory.dmp

        Filesize

        304KB

      • memory/2220-1-0x000007FEF5020000-0x000007FEF5A0C000-memory.dmp

        Filesize

        9.9MB

      • memory/2220-2-0x000000001BB10000-0x000000001BB90000-memory.dmp

        Filesize

        512KB

      • memory/2220-3-0x00000000008E0000-0x00000000008FC000-memory.dmp

        Filesize

        112KB

      • memory/2220-4-0x00000000020C0000-0x00000000020D6000-memory.dmp

        Filesize

        88KB

      • memory/2220-5-0x000007FEF5020000-0x000007FEF5A0C000-memory.dmp

        Filesize

        9.9MB

      • memory/2220-6-0x000000001BB10000-0x000000001BB90000-memory.dmp

        Filesize

        512KB

      • memory/2220-7-0x0000000002160000-0x0000000002176000-memory.dmp

        Filesize

        88KB

      • memory/2220-8-0x0000000076CD0000-0x0000000076E79000-memory.dmp

        Filesize

        1.7MB

      • memory/2220-9-0x0000000076CD0000-0x0000000076E79000-memory.dmp

        Filesize

        1.7MB