Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 21:38

General

  • Target

    433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe

  • Size

    2.4MB

  • MD5

    23878e53dc083c8a3eaaa56a47df0f46

  • SHA1

    33de428e36e9cbcbf1363587ce387a685c9aff9f

  • SHA256

    433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc

  • SHA512

    3ea1a4534294567a63320ae71f4dddb4a5d9cab36ea74d5fd45f6514905e0b9de38dc46ca87138a17cc43b730662828f9f6101993697c6ec9a6574cf9b72b0d9

  • SSDEEP

    49152:C02faKRvNBmM9KzFa1F5y0ElNhIyGuDOfg2fwPB/XUSquJ3F:C0MFvfmM8zYF5y0ErqyhO42A/XUSq0F

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

95.211.208.153:6606

95.211.208.153:7707

95.211.208.153:8808

5512.sytes.net:6606

5512.sytes.net:7707

5512.sytes.net:8808

Mutex

Llg9a02PERRO

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe
    "C:\Users\Admin\AppData\Local\Temp\433db8ca4379cc5873903c7022b907ba15d8b92e42074455ab9de094a1d56ddc.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAZABxACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AawBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AawBkACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAaQB3ACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3192
    • C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe
      "C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3176
    • C:\Users\Admin\AppData\Local\Temp\Patch.exe
      "C:\Users\Admin\AppData\Local\Temp\Patch.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Patch.exe

    Filesize

    62KB

    MD5

    ce05447157c7ef90eba3fd8f964de822

    SHA1

    f034960560285c2b5d563a615263baa44b49d670

    SHA256

    9069e06079e1e69fe4462096859bbd6feb1fc7e2803c285bf7a3498382f93095

    SHA512

    60820fbdd9d8f726e15d33b71b6873779ac649401cd6854f5dc42c27d257dd467bc33dd224883a7c8e9e3801fe443f0dde98890f1468891cbc405a42b9e0e7b3

  • C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe

    Filesize

    2.4MB

    MD5

    5870c41c149fdd038336b2a1b2103e2f

    SHA1

    d3efce3cc94fb928113481aee8d58cdeea24a708

    SHA256

    9b489f300c3797e9d343a47ecd96e83646a61b02c28b5e68071d26a5a666c929

    SHA512

    9fdbc2281e54dc640e8b2598faedabffe70f3fc739d88a603c0d43a8496fc08b07fcebd63fabd11d69c3393edb28eec867ab505a5c694ebe17632d04fe8952a7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eupdbptq.xgi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\dup2patcher.dll

    Filesize

    56KB

    MD5

    34887489d2c8963dcb4ea6baf78f4254

    SHA1

    5821fcfe7ebafac3d569e6da18720fe0619ea162

    SHA256

    4ef87c43607bb2c8d9dd813e91a2c8867ad50f0166a12da853d16c2df913182b

    SHA512

    c0f1a3182cd9373a7bb0d12470d6668fdfc799436986172885aaf1040ee878878b7f799f8c4424e92fc610f21833f0022a858e123b29de7d669e21542c9b02dc

  • memory/2648-56-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-69-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-4969-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/2648-27-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/2648-4964-0x0000000007540000-0x0000000007594000-memory.dmp

    Filesize

    336KB

  • memory/2648-4963-0x0000000005A00000-0x0000000005A4C000-memory.dmp

    Filesize

    304KB

  • memory/2648-4961-0x0000000005950000-0x00000000059AC000-memory.dmp

    Filesize

    368KB

  • memory/2648-31-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/2648-32-0x0000000005A50000-0x0000000005C70000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-62-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-51-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-52-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-54-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-25-0x0000000000CF0000-0x0000000000F52000-memory.dmp

    Filesize

    2.4MB

  • memory/2648-46-0x0000000006DA0000-0x0000000006FC2000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-48-0x00000000070F0000-0x0000000007182000-memory.dmp

    Filesize

    584KB

  • memory/2648-47-0x0000000007590000-0x0000000007B34000-memory.dmp

    Filesize

    5.6MB

  • memory/2648-58-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-60-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-74-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-80-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-95-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-114-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-112-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-110-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-108-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-106-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-104-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-102-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-100-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-64-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-66-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-70-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-72-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-76-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-78-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-82-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-84-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-98-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-96-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-92-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-90-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-88-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2648-86-0x0000000006DA0000-0x0000000006FBC000-memory.dmp

    Filesize

    2.1MB

  • memory/2984-22-0x0000000075420000-0x0000000075446000-memory.dmp

    Filesize

    152KB

  • memory/3176-4970-0x0000000005540000-0x00000000055DC000-memory.dmp

    Filesize

    624KB

  • memory/3176-4968-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3192-224-0x0000000070140000-0x000000007018C000-memory.dmp

    Filesize

    304KB

  • memory/3192-249-0x00000000071D0000-0x00000000071E1000-memory.dmp

    Filesize

    68KB

  • memory/3192-239-0x0000000007260000-0x00000000072F6000-memory.dmp

    Filesize

    600KB

  • memory/3192-238-0x0000000007040000-0x000000000704A000-memory.dmp

    Filesize

    40KB

  • memory/3192-235-0x0000000006CC0000-0x0000000006D63000-memory.dmp

    Filesize

    652KB

  • memory/3192-50-0x0000000005CD0000-0x0000000005D1C000-memory.dmp

    Filesize

    304KB

  • memory/3192-23-0x00000000738BE000-0x00000000738BF000-memory.dmp

    Filesize

    4KB

  • memory/3192-49-0x0000000005CB0000-0x0000000005CCE000-memory.dmp

    Filesize

    120KB

  • memory/3192-34-0x0000000005600000-0x0000000005666000-memory.dmp

    Filesize

    408KB

  • memory/3192-35-0x0000000005670000-0x00000000056D6000-memory.dmp

    Filesize

    408KB

  • memory/3192-29-0x0000000004E60000-0x0000000005488000-memory.dmp

    Filesize

    6.2MB

  • memory/3192-223-0x0000000006C80000-0x0000000006CB2000-memory.dmp

    Filesize

    200KB

  • memory/3192-36-0x00000000056E0000-0x0000000005A34000-memory.dmp

    Filesize

    3.3MB

  • memory/3192-237-0x0000000006FD0000-0x0000000006FEA000-memory.dmp

    Filesize

    104KB

  • memory/3192-1844-0x0000000007230000-0x000000000723E000-memory.dmp

    Filesize

    56KB

  • memory/3192-2160-0x0000000007240000-0x0000000007254000-memory.dmp

    Filesize

    80KB

  • memory/3192-2553-0x0000000007320000-0x000000000733A000-memory.dmp

    Filesize

    104KB

  • memory/3192-2664-0x0000000007310000-0x0000000007318000-memory.dmp

    Filesize

    32KB

  • memory/3192-4962-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/3192-30-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/3192-234-0x0000000006240000-0x000000000625E000-memory.dmp

    Filesize

    120KB

  • memory/3192-236-0x0000000007610000-0x0000000007C8A000-memory.dmp

    Filesize

    6.5MB

  • memory/3192-26-0x00000000046E0000-0x0000000004716000-memory.dmp

    Filesize

    216KB

  • memory/3192-28-0x00000000738B0000-0x0000000074060000-memory.dmp

    Filesize

    7.7MB

  • memory/3192-33-0x0000000004DE0000-0x0000000004E02000-memory.dmp

    Filesize

    136KB