Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 12:52

General

  • Target

    Hotmail checker/Hotmal new checker.exe

  • Size

    1.1MB

  • MD5

    ce94631ddcb5fc30c305ce32e49a05a5

  • SHA1

    f0b656e3a2042d5a58b821962e2b8f0f10fa1ec4

  • SHA256

    900db12322da42a224e4df96487ca1446d456d72580976a5f102e430ecb16ddd

  • SHA512

    966497e841950ca55677f24570b331ba2638e34249edd6385b2332c453166315f5d72467bb83a246124dbeb2bcfb0c4044b22e98b44be4b6181c7a3e8ef8f891

  • SSDEEP

    6144:aSncRlHDubaBBOBIIj6HLLYLCYJqvc1D60Xbywj/c9aqX9bxD/e00sNjT6lmRkss:34kbaNEc9a2/d0Oylmq

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6003478563:AAG3aliPXpD1ZldBFn1R2thp1ARU2PprMtU/sendMessage?chat_id=6052812018

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops desktop.ini file(s) 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hotmail checker\Hotmal new checker.exe
    "C:\Users\Admin\AppData\Local\Temp\Hotmail checker\Hotmal new checker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\HOTMAIL CHECKER.EXE
      "C:\Users\Admin\AppData\Local\Temp\HOTMAIL CHECKER.EXE"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:2940
          • C:\Windows\SysWOW64\netsh.exe
            netsh wlan show profile
            4⤵
              PID:2948
            • C:\Windows\SysWOW64\findstr.exe
              findstr All
              4⤵
                PID:2932
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2384
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                4⤵
                  PID:2296
                • C:\Windows\SysWOW64\netsh.exe
                  netsh wlan show networks mode=bssid
                  4⤵
                    PID:2828
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\HOTMAIL CHECKER.EXE"
                  3⤵
                  • Creates scheduled task(s)
                  PID:1560
              • C:\Users\Admin\AppData\Local\Temp\HOTMAL NEW CHECKER.EXE
                "C:\Users\Admin\AppData\Local\Temp\HOTMAL NEW CHECKER.EXE"
                2⤵
                • Executes dropped EXE
                PID:2380

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              39b8c0c118ce2076475ca34ef8c7d802

              SHA1

              c2c7d95575a43470d66506cc0ac2e016441cd9a8

              SHA256

              76ed4a73d03b9c8a023baabfc743d0dd5c72980fbf768a9f71acf45a996cbcce

              SHA512

              939ccd233eb70e390ebfa297ba4a762e63fde0ccd0fbab3706350f7fd075d8bfc9e5446a89c8480ac97025a3a176681d30c49248e2f8a9a165d56740f52fb268

            • C:\Users\Admin\AppData\Local\Temp\Cab4B0D.tmp

              Filesize

              65KB

              MD5

              ac05d27423a85adc1622c714f2cb6184

              SHA1

              b0fe2b1abddb97837ea0195be70ab2ff14d43198

              SHA256

              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

              SHA512

              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

            • C:\Users\Admin\AppData\Local\Temp\HOTMAIL CHECKER.EXE

              Filesize

              175KB

              MD5

              faea3894b67011555be2b362c0a6f4ea

              SHA1

              f9f87162d9570b55e18fe2c1658ef628356677cc

              SHA256

              6fee9ae08cf4d224f566c7bea2bffbdd43d71eeb7feea02b083527614648263f

              SHA512

              2e3d57329836adac4178b5ccde4fee8b0df3d43e964272ceb665131afbce1eb67dd2509589827ef50adc34ef96063c4e7fac69e6fbb6514ce3eba361268ea9e9

            • C:\Users\Admin\AppData\Local\Temp\HOTMAL NEW CHECKER.EXE

              Filesize

              600KB

              MD5

              5775f8341b36982f97a1893ea33e5ac1

              SHA1

              ab0d5b6b372b6dce4e12eb6ee97857b42b2c4ded

              SHA256

              a7c76e41f7b2e55ab747e9721b1cba2e8c6e1970d74529ab166f3ae065e840fd

              SHA512

              cbeae0f55d4580069b6cb3c4e1c0b36da0a6094c85d9d4d0a769f5331bc06f96b5f6892d5bb0f86d73f3237b8dd7111d28d10f5ba9e8674cded4f5e53ec7540c

            • C:\Users\Admin\AppData\Local\Temp\Tar4BFE.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\f17fd43e23b9a8946b87b16b56577305\msgid.dat

              Filesize

              1B

              MD5

              cfcd208495d565ef66e7dff9f98764da

              SHA1

              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

              SHA256

              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

              SHA512

              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

            • memory/2228-15-0x0000000000250000-0x0000000000282000-memory.dmp

              Filesize

              200KB

            • memory/2228-13-0x000000007478E000-0x000000007478F000-memory.dmp

              Filesize

              4KB

            • memory/2228-162-0x000000007478E000-0x000000007478F000-memory.dmp

              Filesize

              4KB

            • memory/2380-16-0x0000000000F60000-0x0000000001026000-memory.dmp

              Filesize

              792KB

            • memory/2380-17-0x0000000074780000-0x0000000074E6E000-memory.dmp

              Filesize

              6.9MB

            • memory/2380-163-0x0000000074780000-0x0000000074E6E000-memory.dmp

              Filesize

              6.9MB