Analysis

  • max time kernel
    164s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-03-2024 03:29

General

  • Target

    SecuriteInfo.com.Trojan.Win32.Penguish.aqk.2138.32152.exe

  • Size

    19.3MB

  • MD5

    e29a0e59ee8a40469e3bedfe2612f567

  • SHA1

    2254d7b5bf1524bb1a224875abba9110f7a815f2

  • SHA256

    118088ebdecef31805885de379e8332d7551078d4f3c6c15db52a70b108cbd76

  • SHA512

    9908d67e32bcbd3f2f29c60ca208bfcaf76252e2f63712d1c625e9a36ac378192977ba6f05cbbfb33baa4db7ae4c1686d36dcfa7363b1dbc571ca3ccbef066df

  • SSDEEP

    196608:WwUNEud08Pz1fCmX14ZEErpm5IQPI9UPDlQ/jMiDNR1T7EPPe:Ww2L8+1OEnuyPZO7DREe

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6B

C2

koradon.giize.com:6606

Mutex

vomsklihddikoeyxag

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Penguish.aqk.2138.32152.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Penguish.aqk.2138.32152.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\livecall.exe
      C:\Users\Admin\AppData\Local\Temp\Updatemonitor\livecall.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Users\Admin\AppData\Roaming\Updatemonitor\livecall.exe
        "C:\Users\Admin\AppData\Roaming\Updatemonitor\livecall.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:5104
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3632
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4312
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3c349b80

      Filesize

      721KB

      MD5

      61fe5df9ecb7dfbfc34f43ae3634bc4b

      SHA1

      922c499ac4aa2725132f64a9702dd42dc4e6a9b5

      SHA256

      23d8a945f326bad023e397d494d05278d31b696cfe20b617211e07fbadad0689

      SHA512

      465679c011fe493fbc8d8f90e0340a00e1cf22f9e5aa17e9383fb3cc2f909ac994231cb60c41fb2f1b89d499b7ebcd3de474e264896650e3c90f2ad197eeddeb

    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\beau.gif

      Filesize

      548KB

      MD5

      24661f448bb28f80efa41b88274400d6

      SHA1

      bb6ee7625afaa9c7ece306d4f674f96ebd2d4342

      SHA256

      dec19caa7976a5affebe1af6c4075f2f59dd5f9828bf482f75306d28f1f1025a

      SHA512

      3848bd428c8849b91c7cb3108cd5a9d3c0676706fadeed6967491f65d85b83c8ccd932ff408b7ee2d5a4f9f1738fda2b3ba458a7a0f8b5395cd74f9b84633797

    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\livecall.exe

      Filesize

      293KB

      MD5

      d9602ab0e6370519bd54d13d22dd6ef5

      SHA1

      95a3a7afdb00e1b2a99fddfe5d3203aa5cd4a09d

      SHA256

      63ec17feda1f0ea80e0dd7b7938fbf7354aedf8d9f4041543afca9a35337f7bf

      SHA512

      4587ca630bf5e421e48d5ac7f9ac6866000b06a99d89c1ca31c999414a63ba06a6be2e11467c045b0e2cddb21d792342e69977e6abda6e265b91044e2c8007cd

    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\msidcrl40.dll

      Filesize

      529KB

      MD5

      17979de21257eaf1bbdcb2425a730f00

      SHA1

      f73c7ab297092f610bd146433908c0f3a6e8bbc2

      SHA256

      2ee849514b81ef98fd09ccc9a2e68e023badd18baee3779ce8241aa49d231456

      SHA512

      ab506bb4b3e3276304ea7c73076c8538fd67fe914085e2dfec66fb5ddb504f336d98a9995196877de4ff16a7db1db648646300f1e2a5675e3e10400117459ad7

    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\msidcrl40.dll

      Filesize

      391KB

      MD5

      d97c14c5e7d484d9a7ad147df94c139c

      SHA1

      d654b074050326d9134fa1612694506396bda079

      SHA256

      8cc4305fa4f24626f64e74c85e2bf42ddda0b2231f6f6f99f03d6001c8cc16ac

      SHA512

      8be6890e91d3790e2142785956f40c0ae11d96b7dc2e352c6ca47fe205bd23e8c9cf7532c9dc304a5b5ede8c66126c3f1f389ccd21fc0a4bfc0a0c5d72eee0a1

    • C:\Users\Admin\AppData\Local\Temp\Updatemonitor\ouzel.ppt

      Filesize

      18KB

      MD5

      4291a76014353530321658fac5d087c4

      SHA1

      22cc218a009927b31f1c888f715b3e48a5d4e4bf

      SHA256

      fb674a1619af1cffd77a9e9c619ddef4e2d88ec5cb572dbf7842662f5a52a7aa

      SHA512

      5cdbee401f0fb79e9f8b044d47e9cb42171a1bba50833712e58162ccdba3d07025c1a5cb3a2e9c469e5cb0e2739ad68f96f0c355d059edb1aa501504da329b9d

    • C:\Users\Admin\AppData\Roaming\Updatemonitor\msidcrl40.dll

      Filesize

      630KB

      MD5

      9514be8bd127e6bdc0e8e88f68528765

      SHA1

      038816272f54101ef9829a4f834312e88b605c3e

      SHA256

      0da17d38bbe0439b4a6635bf7e896e5f607cc17646f1586d745844fefb974413

      SHA512

      27c5c4cad9de779a43e5f1550807711b0c08328a339e1ec893d070f95a481e6b743d166ec7f92dfcdcd3f64a9f5d3884c360bf48bd516cea9229966ee9e4b785

    • C:\Users\Admin\AppData\Roaming\Updatemonitor\msidcrl40.dll

      Filesize

      791KB

      MD5

      35b4cbc40f4df46cc50acb5c6205d757

      SHA1

      7e40413f8c583bc45fe2cbbf87aa095cdc0f8741

      SHA256

      810d73c452411fd045a321517a3ca6841b505c0a8df1cef293f31f1e44eed1cd

      SHA512

      52f9d4ee45c12138cb5f7b103d266dcfe1497ba2bf2cc283047b7c69dfa20f0674ddef02277f85b6bb7b770138a83727d6df05415f2557d60ed8ad107bdcd891

    • memory/3012-28-0x00007FFC4F2D0000-0x00007FFC4F442000-memory.dmp

      Filesize

      1.4MB

    • memory/3012-21-0x00007FFC4F2D0000-0x00007FFC4F442000-memory.dmp

      Filesize

      1.4MB

    • memory/3012-18-0x00007FFC4F2D0000-0x00007FFC4F442000-memory.dmp

      Filesize

      1.4MB

    • memory/3012-16-0x0000000000400000-0x0000000001753000-memory.dmp

      Filesize

      19.3MB

    • memory/3012-0-0x00000000018A0000-0x00000000018A1000-memory.dmp

      Filesize

      4KB

    • memory/3012-50-0x00007FFC4F2D0000-0x00007FFC4F442000-memory.dmp

      Filesize

      1.4MB

    • memory/3616-36-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/3616-37-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

      Filesize

      2.0MB

    • memory/3632-62-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/3632-59-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

      Filesize

      2.0MB

    • memory/3632-64-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/3632-61-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/3632-57-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/4312-70-0x0000000005710000-0x0000000005720000-memory.dmp

      Filesize

      64KB

    • memory/4312-72-0x00000000061B0000-0x0000000006754000-memory.dmp

      Filesize

      5.6MB

    • memory/4312-75-0x0000000005710000-0x0000000005720000-memory.dmp

      Filesize

      64KB

    • memory/4312-74-0x0000000074CE0000-0x0000000075490000-memory.dmp

      Filesize

      7.7MB

    • memory/4312-73-0x0000000005C70000-0x0000000005CD6000-memory.dmp

      Filesize

      408KB

    • memory/4312-65-0x00000000736E0000-0x0000000074934000-memory.dmp

      Filesize

      18.3MB

    • memory/4312-68-0x0000000074CE0000-0x0000000075490000-memory.dmp

      Filesize

      7.7MB

    • memory/4312-69-0x0000000000F90000-0x0000000000FA2000-memory.dmp

      Filesize

      72KB

    • memory/4312-71-0x0000000005B60000-0x0000000005BFC000-memory.dmp

      Filesize

      624KB

    • memory/5104-53-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/5104-52-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

      Filesize

      2.0MB

    • memory/5104-54-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/5104-49-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB

    • memory/5104-55-0x0000000074C10000-0x0000000074D8B000-memory.dmp

      Filesize

      1.5MB