Analysis

  • max time kernel
    42s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 10:38

General

  • Target

    Robloxexecutorerrorfix.exe

  • Size

    74KB

  • MD5

    5bc409623f3a7f76c2e3466991c74661

  • SHA1

    0d0594dc02f459fb7812b33674f001f4cdd9a760

  • SHA256

    33a54a05ebc11facb6e193c56bd39a852330ef3aea24760b590c631bbc93ec3e

  • SHA512

    abe6e1686517095a1caa2074531dc817cd5de1c12c83f998215010a242ebd1d280904580b2015f9ce256f4b8c97d795aa747e56f793c0250f6ad8327becbe856

  • SSDEEP

    1536:xUIccxswYCV6PMVaWjvIUH1bw/6cra95QzcGKVclN:xU1cxsny6PMVaWhH1bwCT5QfYY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

212.132.117.91:4449

Mutex

Stsrem2123

Attributes
  • delay

    1

  • install

    true

  • install_file

    Sysdataimportant.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Robloxexecutorerrorfix.exe
    "C:\Users\Admin\AppData\Local\Temp\Robloxexecutorerrorfix.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3932
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/508-11-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-16-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-15-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-13-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-7-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-6-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-12-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-5-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-17-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/508-14-0x0000021D94DA0000-0x0000021D94DA1000-memory.dmp

          Filesize

          4KB

        • memory/3932-0-0x00007FFB470E3000-0x00007FFB470E5000-memory.dmp

          Filesize

          8KB

        • memory/3932-1-0x00000000001B0000-0x00000000001C8000-memory.dmp

          Filesize

          96KB

        • memory/3932-4-0x00007FFB470E0000-0x00007FFB47BA1000-memory.dmp

          Filesize

          10.8MB

        • memory/3932-3-0x00007FFB470E0000-0x00007FFB47BA1000-memory.dmp

          Filesize

          10.8MB