Analysis Overview
SHA256
44d6c4340b60dd1bc93931e2e1756e1f1c8679e1007f246815fdd7f23607b54e
Threat Level: Known bad
The file 3304872eb5f8f05b6ea7259446b5899c.bin was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Asyncrat family
Reads user/profile data of web browsers
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-20 08:53
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 08:53
Reported
2024-06-20 08:56
Platform
win10-20240404-en
Max time kernel
134s
Max time network
148s
Command Line
Signatures
AsyncRat
Reads user/profile data of web browsers
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe
"C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| DE | 168.119.119.140:6606 | mochas.in-the-band.net | tcp |
| US | 8.8.8.8:53 | 140.119.119.168.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| DE | 168.119.119.140:6606 | mochas.in-the-band.net | tcp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 84.65.42.20.in-addr.arpa | udp |
Files
memory/4024-0-0x00000000732AE000-0x00000000732AF000-memory.dmp
memory/4024-1-0x0000000000AB0000-0x0000000000AC6000-memory.dmp
memory/4024-2-0x00000000732A0000-0x000000007398E000-memory.dmp
memory/4024-3-0x0000000005A30000-0x0000000005F2E000-memory.dmp
memory/4024-4-0x00000000056D0000-0x0000000005762000-memory.dmp
memory/4024-5-0x00000000056A0000-0x00000000056AA000-memory.dmp
memory/4024-8-0x0000000006700000-0x000000000679C000-memory.dmp
memory/4024-9-0x00000000067A0000-0x0000000006806000-memory.dmp
memory/4024-10-0x00000000732AE000-0x00000000732AF000-memory.dmp
memory/4024-11-0x00000000732A0000-0x000000007398E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 08:53
Reported
2024-06-20 08:56
Platform
win10v2004-20240508-en
Max time kernel
138s
Max time network
147s
Command Line
Signatures
AsyncRat
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe
"C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
Files
memory/1440-0-0x000000007479E000-0x000000007479F000-memory.dmp
memory/1440-1-0x0000000000E90000-0x0000000000EA6000-memory.dmp
memory/1440-2-0x0000000074790000-0x0000000074F40000-memory.dmp
memory/1440-3-0x0000000005ED0000-0x0000000006474000-memory.dmp
memory/1440-4-0x0000000005B10000-0x0000000005BA2000-memory.dmp
memory/1440-5-0x0000000005B00000-0x0000000005B0A000-memory.dmp
memory/1440-6-0x000000007479E000-0x000000007479F000-memory.dmp
memory/1440-7-0x0000000074790000-0x0000000074F40000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-20 08:53
Reported
2024-06-20 08:56
Platform
win11-20240611-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
AsyncRat
Reads user/profile data of web browsers
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe
"C:\Users\Admin\AppData\Local\Temp\e22a31fdf71a913964b1f1328e132325f0188b56e5a65c025f0d553e440e2cf2.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | mochas.in-the-band.net | udp |
| DE | 168.119.119.140:7707 | mochas.in-the-band.net | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.119.119.168.in-addr.arpa | udp |
| DE | 168.119.119.140:7707 | mochas.in-the-band.net | tcp |
Files
memory/3872-0-0x0000000074C7E000-0x0000000074C7F000-memory.dmp
memory/3872-1-0x0000000000B30000-0x0000000000B46000-memory.dmp
memory/3872-2-0x0000000074C70000-0x0000000075421000-memory.dmp
memory/3872-3-0x0000000005D80000-0x0000000006326000-memory.dmp
memory/3872-4-0x00000000059B0000-0x0000000005A42000-memory.dmp
memory/3872-5-0x0000000005990000-0x000000000599A000-memory.dmp
memory/3872-8-0x0000000006A20000-0x0000000006ABC000-memory.dmp
memory/3872-9-0x0000000006AC0000-0x0000000006B26000-memory.dmp
memory/3872-10-0x0000000074C7E000-0x0000000074C7F000-memory.dmp
memory/3872-11-0x0000000074C70000-0x0000000075421000-memory.dmp