Analysis

  • max time kernel
    90s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2024 03:44

General

  • Target

    P.O.exe

  • Size

    480KB

  • MD5

    2eff738980e22cf3f48b9cf8b78663ac

  • SHA1

    419d1ae415f048372bc9fbb99f7a050f0f7f88e5

  • SHA256

    832506397be8817683e8dcac4604eaee19f0add472b9332cb667067562487896

  • SHA512

    7d4973802a0615d6f64a1941f38f6d12d01b49315b07ddbc157261b32572745ae4bc07a9ff3d780596ed1f6bc9c873ffef20e8842d572dadbaea5e6d68964e3f

  • SSDEEP

    12288:j50R0MugiOXNbIxUTcKtt904GBfo3Jqlpjg:jyOMugiOCxUAitQu3Jqb

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6B

C2

185.222.58.40:1978

Mutex

qmwtmuxejofbqhzba

Attributes
  • delay

    5

  • install

    true

  • install_file

    windocv.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\P.O.exe
    "C:\Users\Admin\AppData\Local\Temp\P.O.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iYZWyW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80A9.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2848
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iYZWyW.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3324
    • C:\Users\Admin\AppData\Local\Temp\P.O.exe
      "C:\Users\Admin\AppData\Local\Temp\P.O.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'windocv"' /tr "'C:\Users\Admin\AppData\Roaming\windocv.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:4224
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC2E2.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4708
        • C:\Users\Admin\AppData\Roaming\windocv.exe
          "C:\Users\Admin\AppData\Roaming\windocv.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4084
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iYZWyW.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4080
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iYZWyW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF7DD.tmp"
            5⤵
            • Creates scheduled task(s)
            PID:1244
          • C:\Users\Admin\AppData\Roaming\windocv.exe
            "C:\Users\Admin\AppData\Roaming\windocv.exe"
            5⤵
            • Executes dropped EXE
            PID:1516
          • C:\Users\Admin\AppData\Roaming\windocv.exe
            "C:\Users\Admin\AppData\Roaming\windocv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\P.O.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    c283bb2b81b5454a8b25987dffa07b78

    SHA1

    52ad2cc16d041981ff864da8a90a86f867fce8cf

    SHA256

    b4e3e6ae01f7a5a7bef80bc4f37c04fef931aab06eec80bd77c49a1b882c9d07

    SHA512

    e36677589e2edd26fec25b1e6307644022c97ab942595a9aa39e78cab00a4921d4f33cacf7b51c42f69f4a333df0d3b4d1ab320c46e36cfd108f679f51161075

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_chxou4ve.qw1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp80A9.tmp

    Filesize

    1KB

    MD5

    6b4bd266af3d69715d78788954fe6251

    SHA1

    cda0986bb341b8cf972561819104e455de02316a

    SHA256

    ba107f6232780317dbccdff74871055b1feede5ffc87d0f63d43b3e91dd85edc

    SHA512

    42d7509e07a2c83e50313cb6d4df560f7751ac99d2deb231578af34f586eeadfa2932102e6907a8c649bfef888cfbe30e43fd16d4971d0190c3872f66e0be3de

  • C:\Users\Admin\AppData\Local\Temp\tmpC2E2.tmp.bat

    Filesize

    151B

    MD5

    623d0ae8cb8e4956dfba090a8633b66b

    SHA1

    d5293e75f15a99e97903c03bab51510c8408cbc4

    SHA256

    6b2857fa5a7f77e41ef7d9a1d538ff8d82d9f261d84f46ba861fcfd917a65090

    SHA512

    9ab9833f35c17e7ce4810c413294331ad131b80f68aa9edefcb98a2034bdd3fd6c98f1b10c4a9f10ff43753401744c3013e35d4bc29e677f9aa4425bb052fc7e

  • C:\Users\Admin\AppData\Roaming\windocv.exe

    Filesize

    2.6MB

    MD5

    b2575727290353bd0bd5f9100b75b688

    SHA1

    8367c44146401c7788ff890a809d5f50de72f27e

    SHA256

    34c710f4ecab47c1d985a248844be47c2bc200adb828a17571142eb39c416426

    SHA512

    450de05b203aaf292c1b6e393413ea353ecf38ce057ce35c5f2c77aaeace6bfa6cbefe783b45ca833ce21645846fe6ebb844e2c9b812f28bf0ecd5becbb20d96

  • C:\Users\Admin\AppData\Roaming\windocv.exe

    Filesize

    3.0MB

    MD5

    552c77e6b7e74c1a8d163ec4e491bde3

    SHA1

    8e2576739fed5bd96c24b2128da701b89d3eca1a

    SHA256

    e70531ddadb51f1fbe98f880a83ba973dc7b709edf07db2507f16cd3aa863999

    SHA512

    eb3a5db9eb7641cb5b00442d37dbbbbd0a506da3eab1de1a729c6945e1d9c59135d2ae602f13add1a0e6f025937b42bc5ecc1c7baf45cf285a4bd24d719f9ad7

  • C:\Users\Admin\AppData\Roaming\windocv.exe

    Filesize

    2.8MB

    MD5

    baa7cbcf91ec0a8abeded89d15641ed3

    SHA1

    1a507f67fbf81195f3fb2872651c681b2ab7c83d

    SHA256

    65a9d8d454fa4d376f9d0889abe91aedd2b8ba0f46098c9a1c5f5130e491f1d9

    SHA512

    93b46312e8c1fe3436ca1a9647b2fe6807c733a82ab7ba7eee6ee049272af25fc4f0c540fd03af86bed789528e7d4a5c1b6226c3790d77c58c935135755a3cbd

  • C:\Users\Admin\AppData\Roaming\windocv.exe

    Filesize

    1.3MB

    MD5

    16c330fafe2f0e60704de98c54de3c86

    SHA1

    30427906b38b1a46e27257255f472bab8f5aa3f2

    SHA256

    480bba8b06b67883acca26b840827d224f9215dbc97edd2e04db1bb24c489d6c

    SHA512

    1ad120fd9245ae28c2afb5ed339f802fae2c432609a28779cb1e554b7b61a2364975c1b567db8f92d6323e65d90f2b9d5c044733a2fe0244d0c951a54e5e5e31

  • C:\Users\Admin\AppData\Roaming\windocv.exe

    Filesize

    1.1MB

    MD5

    d723d4d30400d00413f80f9b28db5ef7

    SHA1

    cab7eac987cab676dd829b0508b6b1f2d54cdb65

    SHA256

    122b15278cc8c41f2941b02a17c4a8854e39ced5596a9585d8c205b3016e3038

    SHA512

    1f57ac099233965fa2a3bf362f7b89c3d0764805a0f8d5e786bf7e6bd8cd5c3e6b58b973194983537d42a53507f106b773d75123ef8ff72abf6d726eeafa38e3

  • memory/364-25-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/364-69-0x0000000005580000-0x0000000005590000-memory.dmp

    Filesize

    64KB

  • memory/364-21-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/364-73-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-8-0x0000000005800000-0x0000000005812000-memory.dmp

    Filesize

    72KB

  • memory/1388-3-0x00000000054F0000-0x0000000005582000-memory.dmp

    Filesize

    584KB

  • memory/1388-10-0x0000000009410000-0x00000000094AC000-memory.dmp

    Filesize

    624KB

  • memory/1388-7-0x00000000055D0000-0x00000000055DE000-memory.dmp

    Filesize

    56KB

  • memory/1388-9-0x0000000006DE0000-0x0000000006E34000-memory.dmp

    Filesize

    336KB

  • memory/1388-1-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-0-0x0000000000AA0000-0x0000000000B1E000-memory.dmp

    Filesize

    504KB

  • memory/1388-6-0x0000000005920000-0x0000000005940000-memory.dmp

    Filesize

    128KB

  • memory/1388-5-0x00000000055B0000-0x00000000055BA000-memory.dmp

    Filesize

    40KB

  • memory/1388-4-0x0000000005760000-0x0000000005770000-memory.dmp

    Filesize

    64KB

  • memory/1388-24-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/1388-2-0x00000000059A0000-0x0000000005F44000-memory.dmp

    Filesize

    5.6MB

  • memory/3228-101-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3228-126-0x00000000051E0000-0x00000000051F0000-memory.dmp

    Filesize

    64KB

  • memory/3228-125-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3324-59-0x0000000007640000-0x000000000764A000-memory.dmp

    Filesize

    40KB

  • memory/3324-63-0x0000000007810000-0x0000000007824000-memory.dmp

    Filesize

    80KB

  • memory/3324-54-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/3324-43-0x0000000071B60000-0x0000000071BAC000-memory.dmp

    Filesize

    304KB

  • memory/3324-58-0x00000000075D0000-0x00000000075EA000-memory.dmp

    Filesize

    104KB

  • memory/3324-57-0x0000000007C10000-0x000000000828A000-memory.dmp

    Filesize

    6.5MB

  • memory/3324-55-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/3324-41-0x000000007F7C0000-0x000000007F7D0000-memory.dmp

    Filesize

    64KB

  • memory/3324-60-0x0000000007850000-0x00000000078E6000-memory.dmp

    Filesize

    600KB

  • memory/3324-61-0x00000000077D0000-0x00000000077E1000-memory.dmp

    Filesize

    68KB

  • memory/3324-62-0x0000000007800000-0x000000000780E000-memory.dmp

    Filesize

    56KB

  • memory/3324-64-0x0000000007910000-0x000000000792A000-memory.dmp

    Filesize

    104KB

  • memory/3324-65-0x00000000078F0000-0x00000000078F8000-memory.dmp

    Filesize

    32KB

  • memory/3324-32-0x0000000005B30000-0x0000000005B96000-memory.dmp

    Filesize

    408KB

  • memory/3324-68-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3324-53-0x00000000068A0000-0x00000000068BE000-memory.dmp

    Filesize

    120KB

  • memory/3324-42-0x0000000006860000-0x0000000006892000-memory.dmp

    Filesize

    200KB

  • memory/3324-40-0x00000000062F0000-0x000000000633C000-memory.dmp

    Filesize

    304KB

  • memory/3324-17-0x00000000052D0000-0x00000000058F8000-memory.dmp

    Filesize

    6.2MB

  • memory/3324-39-0x00000000062A0000-0x00000000062BE000-memory.dmp

    Filesize

    120KB

  • memory/3324-15-0x0000000002910000-0x0000000002946000-memory.dmp

    Filesize

    216KB

  • memory/3324-18-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3324-19-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/3324-56-0x00000000074A0000-0x0000000007543000-memory.dmp

    Filesize

    652KB

  • memory/3324-26-0x0000000005A80000-0x0000000005AA2000-memory.dmp

    Filesize

    136KB

  • memory/3324-20-0x0000000002860000-0x0000000002870000-memory.dmp

    Filesize

    64KB

  • memory/3324-33-0x0000000005C10000-0x0000000005C76000-memory.dmp

    Filesize

    408KB

  • memory/3324-38-0x0000000005DC0000-0x0000000006114000-memory.dmp

    Filesize

    3.3MB

  • memory/4080-104-0x0000000006680000-0x00000000066CC000-memory.dmp

    Filesize

    304KB

  • memory/4080-118-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4080-96-0x00000000060D0000-0x0000000006424000-memory.dmp

    Filesize

    3.3MB

  • memory/4080-86-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4080-85-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4080-83-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4080-122-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4080-105-0x000000007F780000-0x000000007F790000-memory.dmp

    Filesize

    64KB

  • memory/4080-106-0x0000000075520000-0x000000007556C000-memory.dmp

    Filesize

    304KB

  • memory/4080-120-0x0000000007B40000-0x0000000007B54000-memory.dmp

    Filesize

    80KB

  • memory/4080-117-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4080-116-0x0000000007840000-0x00000000078E3000-memory.dmp

    Filesize

    652KB

  • memory/4080-119-0x0000000007AF0000-0x0000000007B01000-memory.dmp

    Filesize

    68KB

  • memory/4084-102-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4084-80-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

    Filesize

    72KB

  • memory/4084-79-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/4084-78-0x0000000074C40000-0x00000000753F0000-memory.dmp

    Filesize

    7.7MB