Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 12:39

General

  • Target

    46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe

  • Size

    89KB

  • MD5

    12de70d06ed65680914d061347ac1f95

  • SHA1

    14023e1ed46236cbfb463ddccd6345caa3c14d54

  • SHA256

    46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

  • SHA512

    7d6a20b0e9d6c5db0177e08f197f7858aa8000097c5eb2fa7a2b3d2181fefb53760efacd7fcba32d481193eee547162ac22b08b8e8777b68fc1597dec12db67f

  • SSDEEP

    1536:EGjb5BKhaUxo6TRMinLvIbzV6A2SYzEOV4c7rei1:EGjb5IJxZTLnL4aSY4OVDui

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

103.249.112.118:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

phemedrone

C2

http://77.221.151.42/dashboard/gate.php

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Phemedrone

    An information and wallet stealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Downloads MZ/PE file
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
    "C:\Users\Admin\AppData\Local\Temp\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SYSTEM32\SCHtAsKs.EXe
      "SCHtAsKs.EXe" /create /tn WindowsUpdates /TR 'C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE' /du 9999:59 /sc daily /ri 1
      2⤵
      • Creates scheduled task(s)
      PID:4436
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Users\Admin\AppData\Local\Temp\xUUNwWsq.exe
        "C:\Users\Admin\AppData\Local\Temp\xUUNwWsq.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2772
  • C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
    C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1896
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2840
    • C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
      C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Accounts_Ledger_Software.eXE.log

      Filesize

      660B

      MD5

      284393596fdd49bebd7b861bf339b82d

      SHA1

      a36767dfc423b3c7fd3ff439b616862743a053c8

      SHA256

      0e692bcbba51ca4e766a427c9f28a7a4a9e326d2cf835493e57a9dc2121326b5

      SHA512

      8d3247ee0c3bf9a9fceea23eb5c646dbd8b3d954f4d62622f49070629e642d6a13bfb0d27949e2355c081d45f5a1101f05a9972782a0f0a478ed90f551d2efeb

    • C:\Users\Admin\AppData\Local\Temp\xUUNwWsq.exe

      Filesize

      89KB

      MD5

      421c40695b1537b040830d13b7b860d8

      SHA1

      a63377c184c808116f7c192cd7c5f4dd763a77d3

      SHA256

      a48ed05b6c117fd2ecf7c9bbf17ae3253e6aab133cdd4a06da54298635a136a5

      SHA512

      27564661871e700fea1ef7e2d28e739e32a0c580323fbb42c5139a64b68afffae7ac9445eb7d304502b22bacb64c611a05392a19a59a4b30ddd4bad1aa59e2f0

    • C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE

      Filesize

      89KB

      MD5

      12de70d06ed65680914d061347ac1f95

      SHA1

      14023e1ed46236cbfb463ddccd6345caa3c14d54

      SHA256

      46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

      SHA512

      7d6a20b0e9d6c5db0177e08f197f7858aa8000097c5eb2fa7a2b3d2181fefb53760efacd7fcba32d481193eee547162ac22b08b8e8777b68fc1597dec12db67f

    • memory/1476-0-0x0000000000F70000-0x0000000000F8A000-memory.dmp

      Filesize

      104KB

    • memory/1476-2-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/1476-3-0x000000001BE40000-0x000000001BE50000-memory.dmp

      Filesize

      64KB

    • memory/1476-4-0x000000001BDA0000-0x000000001BDDC000-memory.dmp

      Filesize

      240KB

    • memory/1476-5-0x00000000033B0000-0x00000000033B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-8-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/1896-22-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/1896-23-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/2772-49-0x0000000074840000-0x0000000074FF1000-memory.dmp

      Filesize

      7.7MB

    • memory/2772-43-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2772-46-0x0000000074840000-0x0000000074FF1000-memory.dmp

      Filesize

      7.7MB

    • memory/2772-47-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/2772-48-0x0000000005690000-0x0000000005722000-memory.dmp

      Filesize

      584KB

    • memory/2772-52-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3168-41-0x000000001BDB0000-0x000000001BDC0000-memory.dmp

      Filesize

      64KB

    • memory/3168-39-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/3168-45-0x00007FFC56F10000-0x00007FFC579D2000-memory.dmp

      Filesize

      10.8MB

    • memory/3168-38-0x0000000000F00000-0x0000000000F1A000-memory.dmp

      Filesize

      104KB

    • memory/3396-54-0x00007FFC56C50000-0x00007FFC57712000-memory.dmp

      Filesize

      10.8MB

    • memory/3396-53-0x00007FFC56C50000-0x00007FFC57712000-memory.dmp

      Filesize

      10.8MB

    • memory/4792-15-0x0000000005E00000-0x00000000063A6000-memory.dmp

      Filesize

      5.6MB

    • memory/4792-17-0x0000000074840000-0x0000000074FF1000-memory.dmp

      Filesize

      7.7MB

    • memory/4792-16-0x00000000058C0000-0x0000000005926000-memory.dmp

      Filesize

      408KB

    • memory/4792-24-0x0000000000FC0000-0x0000000001036000-memory.dmp

      Filesize

      472KB

    • memory/4792-18-0x0000000005120000-0x0000000005130000-memory.dmp

      Filesize

      64KB

    • memory/4792-14-0x0000000005510000-0x00000000055AC000-memory.dmp

      Filesize

      624KB

    • memory/4792-11-0x00000000773F2000-0x00000000773F3000-memory.dmp

      Filesize

      4KB

    • memory/4792-10-0x0000000005120000-0x0000000005130000-memory.dmp

      Filesize

      64KB

    • memory/4792-9-0x0000000074840000-0x0000000074FF1000-memory.dmp

      Filesize

      7.7MB

    • memory/4792-6-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/4792-26-0x0000000000FA0000-0x0000000000FBE000-memory.dmp

      Filesize

      120KB

    • memory/4792-25-0x0000000000F40000-0x0000000000F4E000-memory.dmp

      Filesize

      56KB