Analysis

  • max time kernel
    591s
  • max time network
    601s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 22:17

General

  • Target

    CCXProcess.exe

  • Size

    127KB

  • MD5

    8fc1ba33db2aeb28138bbafe4708c834

  • SHA1

    7f645dccb5c0641079ab42a44d48903400bfd0cf

  • SHA256

    52d77f0c17e871983e761c9fef3b93b1b3263878fd91caa330bd1a1bc8c75355

  • SHA512

    ac24efdc015deb986a6963b1b92276b54715266d3c15edfb0325f63aa7462434b8539220cc1c3aafacb3f6eb1e3d097bf4f58bc9bfecf00d839ad6ea11784ee2

  • SSDEEP

    3072:rUFcxoyXkiPMVDqgiH1brxVyqQCguKMkDEi4Y:rVkiPMV+VbT5rgNEv

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

C2

C2

181.47.208.50:4449

Mutex

egycitgaxejyhidp

Attributes
  • delay

    5

  • install

    true

  • install_file

    CCXProcess.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CCXProcess.exe
    "C:\Users\Admin\AppData\Local\Temp\CCXProcess.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:532
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:812
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:1520
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:5116
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:732
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:320
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4272
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4992

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\005a2f60177abd32427ea41e332644d4\Admin@QIVBHIQT_en-US\System\Process.txt

            Filesize

            749B

            MD5

            c8a90250ba840f8f479c698994e82b2c

            SHA1

            dc17263636f77ae3b1077284ef6fff0939fe6b0d

            SHA256

            e1291712fdf0e89c6baa3fd430c432d294b286bfbfd1a27810b29190b8ad0492

            SHA512

            ef783a028fbc505477bb283a113556cd9ffecf62216c21c76a26e95166c9040ad293ddba472c7ca710738416ddd164b5e4bead9689e5204b3a641c8cbc7654fc

          • C:\Users\Admin\AppData\Local\005a2f60177abd32427ea41e332644d4\Admin@QIVBHIQT_en-US\System\Process.txt

            Filesize

            4KB

            MD5

            24987e5e3deb25751a8dda622d5725f2

            SHA1

            e5a6bddc25860ef137ba4197ecd3f43fb2a4f173

            SHA256

            619006bf6f86a007bc324736e723c2d86ebec90cdd4d9732e69e055615817080

            SHA512

            0e612adad4bfe900ac27dbe8fefd9ec62daed16d08ff402ffe1633faca3370ff09f133b082c8f5016da895bf6d16ba51fa1b289a6442797b56872fe7cfe924ee

          • C:\Users\Admin\AppData\Local\005a2f60177abd32427ea41e332644d4\msgid.dat

            Filesize

            1B

            MD5

            cfcd208495d565ef66e7dff9f98764da

            SHA1

            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

            SHA256

            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

            SHA512

            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

          • C:\Users\Admin\AppData\Local\Temp\places.raw

            Filesize

            5.0MB

            MD5

            dc12f0d5e3d37a36754e395494764fa8

            SHA1

            f6afda1bad75e8cab00daf848f8761a6d81c9e49

            SHA256

            bcef9af37c07630ffce40d6b50af904c002bdd464e4e14e5af5ef312b2f84955

            SHA512

            aba8e9a3848eafbd169461311e581686a89f81b91dbf36eb6e4a4862c54d4107c13d9b5e8e49c85e5cbe1fb26ad810450067bf42c475968572e19bfb9697e3cd

          • C:\Users\Admin\AppData\Local\Temp\tmpCA6C.tmp.dat

            Filesize

            114KB

            MD5

            93033b50faaecfc1f3413dd113d4f365

            SHA1

            a04840585ab5160bad05c13aabe2a875416b0d79

            SHA256

            51ac570ca79b6f12f89240532e24cf26a9cab7e982b6570e54b10769c6f60e25

            SHA512

            986351814483f2072bf4b83a5bcd221be88f888f90f85ce588807e354b9716e96e0f238735740b6217bfd28ffc75eedeabb2d56d1a10a384ced5501b346611ce

          • C:\Users\Admin\AppData\Local\Temp\tmpCAA1.tmp.dat

            Filesize

            116KB

            MD5

            f70aa3fa04f0536280f872ad17973c3d

            SHA1

            50a7b889329a92de1b272d0ecf5fce87395d3123

            SHA256

            8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

            SHA512

            30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

          • C:\Users\Admin\AppData\Local\Temp\tmpD297.tmp.dat

            Filesize

            40KB

            MD5

            a182561a527f929489bf4b8f74f65cd7

            SHA1

            8cd6866594759711ea1836e86a5b7ca64ee8911f

            SHA256

            42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

            SHA512

            9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

          • C:\Users\Admin\AppData\Local\Temp\tmpD298.tmp.dat

            Filesize

            160KB

            MD5

            f310cf1ff562ae14449e0167a3e1fe46

            SHA1

            85c58afa9049467031c6c2b17f5c12ca73bb2788

            SHA256

            e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

            SHA512

            1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

          • C:\Users\Admin\AppData\Local\Temp\tmpEAD8.tmp.dat

            Filesize

            20KB

            MD5

            a603e09d617fea7517059b4924b1df93

            SHA1

            31d66e1496e0229c6a312f8be05da3f813b3fa9e

            SHA256

            ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

            SHA512

            eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

          • C:\Users\Admin\AppData\Local\Temp\tmpEAEA.tmp.dat

            Filesize

            96KB

            MD5

            40f3eb83cc9d4cdb0ad82bd5ff2fb824

            SHA1

            d6582ba879235049134fa9a351ca8f0f785d8835

            SHA256

            cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

            SHA512

            cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

          • C:\Users\Admin\AppData\Local\Temp\tmpEAFE.tmp.dat

            Filesize

            48KB

            MD5

            349e6eb110e34a08924d92f6b334801d

            SHA1

            bdfb289daff51890cc71697b6322aa4b35ec9169

            SHA256

            c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

            SHA512

            2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

          • C:\Users\Admin\AppData\Local\Temp\tmpEAFF.tmp.dat

            Filesize

            20KB

            MD5

            49693267e0adbcd119f9f5e02adf3a80

            SHA1

            3ba3d7f89b8ad195ca82c92737e960e1f2b349df

            SHA256

            d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

            SHA512

            b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

          • C:\Users\Admin\AppData\Local\Temp\tmpEB00.tmp.dat

            Filesize

            124KB

            MD5

            9618e15b04a4ddb39ed6c496575f6f95

            SHA1

            1c28f8750e5555776b3c80b187c5d15a443a7412

            SHA256

            a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

            SHA512

            f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

          • memory/532-413-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-418-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-17-0x000000001CA40000-0x000000001CB62000-memory.dmp

            Filesize

            1.1MB

          • memory/532-56-0x0000000000F20000-0x0000000000F42000-memory.dmp

            Filesize

            136KB

          • memory/532-57-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-58-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-59-0x000000001D7F0000-0x000000001D924000-memory.dmp

            Filesize

            1.2MB

          • memory/532-60-0x0000000000ED0000-0x0000000000EDA000-memory.dmp

            Filesize

            40KB

          • memory/532-15-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-14-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-13-0x000000001B4D0000-0x000000001B4EE000-memory.dmp

            Filesize

            120KB

          • memory/532-12-0x000000001C590000-0x000000001C5F6000-memory.dmp

            Filesize

            408KB

          • memory/532-11-0x000000001C610000-0x000000001C686000-memory.dmp

            Filesize

            472KB

          • memory/532-10-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-9-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-204-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-206-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-208-0x000000001C490000-0x000000001C50A000-memory.dmp

            Filesize

            488KB

          • memory/532-251-0x000000001CB60000-0x000000001CBE4000-memory.dmp

            Filesize

            528KB

          • memory/532-8-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-7-0x00007FFB38253000-0x00007FFB38255000-memory.dmp

            Filesize

            8KB

          • memory/532-6-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-4-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-3-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-1-0x00007FFB38253000-0x00007FFB38255000-memory.dmp

            Filesize

            8KB

          • memory/532-298-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-338-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-378-0x00007FFB38250000-0x00007FFB38D11000-memory.dmp

            Filesize

            10.8MB

          • memory/532-379-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-380-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-381-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-382-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-383-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-384-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-439-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-438-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-437-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-436-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-435-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-434-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-433-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-432-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-431-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-430-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-398-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-399-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-400-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-401-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-402-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-403-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-404-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-405-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-406-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-407-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-408-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-409-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-410-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-411-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-412-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-0-0x00000000007C0000-0x00000000007E6000-memory.dmp

            Filesize

            152KB

          • memory/532-414-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-415-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-416-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-417-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-16-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-419-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-420-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-421-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-422-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-423-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-424-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-425-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-426-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-427-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-428-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/532-429-0x000000001C890000-0x000000001CA39000-memory.dmp

            Filesize

            1.7MB

          • memory/4272-391-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-393-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-394-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-395-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-396-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-397-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-392-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-387-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-386-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB

          • memory/4272-385-0x000001CAE3F10000-0x000001CAE3F11000-memory.dmp

            Filesize

            4KB