Analysis

  • max time kernel
    128s
  • max time network
    129s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-07-2024 11:39

General

  • Target

    cl2.exe

  • Size

    63KB

  • MD5

    940feefa06903f38abf31638bb3c8274

  • SHA1

    54ce0795ed9ba72d7546eb90b4c7b77de5eda26d

  • SHA256

    cf1ac26fdc15cd34b9fdc6a6906b323db066e00d63a421cc376129d86645b1d7

  • SHA512

    f035a88739f1520b9ea419a129fe6afa460cdaabc3d84a584edfb8854e406dd4c501e1c3ff3bca36ab4b2b2f001cae731fc8c5d4b806e4c78eb58d04d939b6b3

  • SSDEEP

    1536:qEXiftfNjJTSvYUbih9ogpcousdpqKmY7:qZftFjJTYYUbiNc6Gz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

5.tcp.eu.ngrok.io:12431

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cl2.exe
    "C:\Users\Admin\AppData\Local\Temp\cl2.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd"
      2⤵
        PID:3988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4780-0-0x00000000006C0000-0x00000000006D6000-memory.dmp

      Filesize

      88KB

    • memory/4780-1-0x00007FFC7A793000-0x00007FFC7A794000-memory.dmp

      Filesize

      4KB

    • memory/4780-2-0x00007FFC7A790000-0x00007FFC7B17C000-memory.dmp

      Filesize

      9.9MB

    • memory/4780-3-0x00007FFC7A790000-0x00007FFC7B17C000-memory.dmp

      Filesize

      9.9MB

    • memory/4780-6-0x000000001C0D0000-0x000000001C146000-memory.dmp

      Filesize

      472KB

    • memory/4780-7-0x000000001B620000-0x000000001B654000-memory.dmp

      Filesize

      208KB

    • memory/4780-8-0x000000001B650000-0x000000001B66E000-memory.dmp

      Filesize

      120KB

    • memory/4780-9-0x00007FFC7A793000-0x00007FFC7A794000-memory.dmp

      Filesize

      4KB

    • memory/4780-10-0x00007FFC7A790000-0x00007FFC7B17C000-memory.dmp

      Filesize

      9.9MB

    • memory/4780-11-0x00007FFC7A790000-0x00007FFC7B17C000-memory.dmp

      Filesize

      9.9MB

    • memory/4780-12-0x0000000000010000-0x0000000000042000-memory.dmp

      Filesize

      200KB

    • memory/4780-13-0x00000000001D0000-0x00000000001EA000-memory.dmp

      Filesize

      104KB

    • memory/4780-14-0x00000000003F0000-0x0000000000422000-memory.dmp

      Filesize

      200KB