Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 21:38

General

  • Target

    433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe

  • Size

    2.4MB

  • MD5

    23878e53dc083c8a3eaaa56a47df0f46

  • SHA1

    33de428e36e9cbcbf1363587ce387a685c9aff9f

  • SHA256

    433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc

  • SHA512

    3ea1a4534294567a63320ae71f4dddb4a5d9cab36ea74d5fd45f6514905e0b9de38dc46ca87138a17cc43b730662828f9f6101993697c6ec9a6574cf9b72b0d9

  • SSDEEP

    49152:C02faKRvNBmM9KzFa1F5y0ElNhIyGuDOfg2fwPB/XUSquJ3F:C0MFvfmM8zYF5y0ErqyhO42A/XUSq0F

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

95.211.208.153:6606

95.211.208.153:7707

95.211.208.153:8808

5512.sytes.net:6606

5512.sytes.net:7707

5512.sytes.net:8808

Mutex

Llg9a02PERRO

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe
    "C:\Users\Admin\AppData\Local\Temp\433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAZABxACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AawBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AawBkACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAaQB3ACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2776
    • C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe
      "C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3272
    • C:\Users\Admin\AppData\Local\Temp\Patch.exe
      "C:\Users\Admin\AppData\Local\Temp\Patch.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab1D52.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    62KB

    MD5

    ce05447157c7ef90eba3fd8f964de822

    SHA1

    f034960560285c2b5d563a615263baa44b49d670

    SHA256

    9069e06079e1e69fe4462096859bbd6feb1fc7e2803c285bf7a3498382f93095

    SHA512

    60820fbdd9d8f726e15d33b71b6873779ac649401cd6854f5dc42c27d257dd467bc33dd224883a7c8e9e3801fe443f0dde98890f1468891cbc405a42b9e0e7b3

  • C:\Users\Admin\AppData\Local\Temp\Tar3171.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe

    Filesize

    2.4MB

    MD5

    5870c41c149fdd038336b2a1b2103e2f

    SHA1

    d3efce3cc94fb928113481aee8d58cdeea24a708

    SHA256

    9b489f300c3797e9d343a47ecd96e83646a61b02c28b5e68071d26a5a666c929

    SHA512

    9fdbc2281e54dc640e8b2598faedabffe70f3fc739d88a603c0d43a8496fc08b07fcebd63fabd11d69c3393edb28eec867ab505a5c694ebe17632d04fe8952a7

  • \Users\Admin\AppData\Local\Temp\dup2patcher.dll

    Filesize

    56KB

    MD5

    34887489d2c8963dcb4ea6baf78f4254

    SHA1

    5821fcfe7ebafac3d569e6da18720fe0619ea162

    SHA256

    4ef87c43607bb2c8d9dd813e91a2c8867ad50f0166a12da853d16c2df913182b

    SHA512

    c0f1a3182cd9373a7bb0d12470d6668fdfc799436986172885aaf1040ee878878b7f799f8c4424e92fc610f21833f0022a858e123b29de7d669e21542c9b02dc

  • memory/2800-53-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-59-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-22-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-23-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-25-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-29-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-31-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-33-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-35-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-27-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-37-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-39-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-43-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-41-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-45-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-47-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-49-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-20-0x0000000005010000-0x0000000005230000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-55-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-51-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-57-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-21-0x0000000006360000-0x0000000006582000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-61-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-63-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-65-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-67-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-69-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-71-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-77-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-81-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-83-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-4909-0x0000000002260000-0x00000000022AC000-memory.dmp

    Filesize

    304KB

  • memory/2800-4908-0x0000000004C30000-0x0000000004C8C000-memory.dmp

    Filesize

    368KB

  • memory/2800-85-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-79-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-75-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-73-0x0000000006360000-0x000000000657C000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-4910-0x0000000004C90000-0x0000000004CE4000-memory.dmp

    Filesize

    336KB

  • memory/2800-19-0x0000000000100000-0x0000000000362000-memory.dmp

    Filesize

    2.4MB

  • memory/2820-16-0x0000000074200000-0x0000000074226000-memory.dmp

    Filesize

    152KB

  • memory/3272-4924-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB