Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 14:21

General

  • Target

    Proforma invoice of dated 17072024.exe

  • Size

    1009KB

  • MD5

    5879893dab2a56f6eb3aecbc82f92012

  • SHA1

    77df5124aff9e2fdcb671f98e269e6177ac5acda

  • SHA256

    003a945d2e248c12dd520fe056a88779dfba87cd22a92ad98afa3fc955f5e01f

  • SHA512

    528161ef99eefeeba35556c707a2da026142c7ca1637ecdaee39fb094d1724c332424a0df251534dce0c2bdd53c4b229db643a6da980f2eaff8a152b0dadb5bf

  • SSDEEP

    24576:+N/BUBb+tYjBFHOcmAvdq06U9RTs0bydWy2CZ/b8qQ8:WpUlRhOc/006Awjd9

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

194.55.186.155:2424

Mutex

qncatmcnnrwluo

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Proforma invoice of dated 17072024.exe
    "C:\Users\Admin\AppData\Local\Temp\Proforma invoice of dated 17072024.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\lobw.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • Gathers network information
          PID:1712
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c efcrtwcqga.txt deeddrm.jpg
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\efcrtwcqga.txt
          efcrtwcqga.txt deeddrm.jpg
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1972
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • Gathers network information
          PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab872C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\aqoirssb.msc

    Filesize

    571B

    MD5

    be07da029e3ccfb0566d97871b4ae802

    SHA1

    d5305019101772e259153e579c344a3b253ecde1

    SHA256

    2eb2ccc0ef33b2e4863258715690b83d942018bd807512835c35f014ceda5f54

    SHA512

    7601bdc17870ce31d41405be75b13f22018e2dd935fc86427bd28f97c2c99042f214ef717b7429caf7944a8fed8b6974c840e9ee214fa288529c703dc3e714dd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bbhwnlxe.mp2

    Filesize

    610B

    MD5

    d9231e764ecc35312e3909b4af4e256f

    SHA1

    ec8d21ef5fc7a858ce4140980e4601234ae71f6b

    SHA256

    437d854fa04dbaf3f36575e065c92467795f3503f18fc50385f06e1640729ac1

    SHA512

    d494ec21a56c3658cfb0e92fd83fa92cb55a30e129fd3c717fd8b70dce24f1d445340a4cb4e1ee5e38aa5603355f11786d6670a70e056e4a2aa5a78693743e3f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\buwfoq.mp2

    Filesize

    582B

    MD5

    7e9f5340b3d561f00413d99657de9c6a

    SHA1

    a0fb6eae43b3b64b392b88e59dba156bf253ee8b

    SHA256

    8623a860e7b011cce4d5f9795fe26027da7e37703239daf21ddcbc57315a9f51

    SHA512

    a04e68f43e898868eb58708532a85c09adc7a29289ae29f80dc0c52b0a95073aeaa6d72aa52a23123d5d9c4a600ad2ea43d37b82eb00f99f140c80c777db1bc6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\citaur.icm

    Filesize

    582B

    MD5

    4f849d549fd3ae031e726edeb93e971a

    SHA1

    15e26598211a185e4adacf19ef2a4f5cf7594569

    SHA256

    779e97485923618d19d8e9d247cec94200dcec910b63834bd4fc23cf4ab8256d

    SHA512

    58867dd54a919e59e7f5ded5ae8429d84997a32668578c7def481edec559ba2f6dd116894a2419e893406da197f32076fd2bdbed48ef4fd661d94f4b5ba047e1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dtkd.bin

    Filesize

    522B

    MD5

    b41daf652b466ffca09703c0e93a88e8

    SHA1

    8690bbf3073534230f9fdfd5208782debf59b38c

    SHA256

    8e891805bb03fc28c46aa528d1463cdcec1f0b8b8cf4a09331a682ceb8722dcd

    SHA512

    ba7e9a7d15095a8f7b228bf8c7fc2f6f3adb00dbaf18543684e03184dced7ec69294e0053137f3fe44ec91347a57fdc4620b8f831dcde73810bb3dcbb68d1125

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dtxqvfi.qsn

    Filesize

    126KB

    MD5

    cddc8509c7f234a762cb6d7ede007b2e

    SHA1

    85190f34a1eb3a9d3b2c9bc1bb44821c4d3b3817

    SHA256

    c23e5320082d7c680bafe0e1c168f63629ff7bf00cce1e722f6c17b872398345

    SHA512

    336d3cb39423d2e47e4544595df5fcee3e64b7d63882c2e0e06b026f8fa2cbd520f27bd97510845777c9e6bee8d5535301c3391ad1247db5839d8ab9cbd9d15e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ebcwxfolbo.icm

    Filesize

    531B

    MD5

    58b10176be33bf634fc019873b53e97c

    SHA1

    66d133742aeaaab9d83bcb1e57b4777d6c0ed1a8

    SHA256

    4bfb6674109ed55fdbe951e88acc59b19202801de5dcfc42ce4b17be301cb341

    SHA512

    374d4bf8667edfe5f4812dcd125365ea64d9b21af0b31facb2db97f31e4a5d3e413cb6901bb13b69897c054001b2ccc731f7f3514ece22b00d847f2c16add3d7

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\efcrtwcqga.txt

    Filesize

    880KB

    MD5

    31db1d81c80c66640b773c535cdfa762

    SHA1

    9cfffe3e21ab746e18db1447bf339d1af2118570

    SHA256

    7972c56b8e4436f6a0ead86511625ff84a605389a447417485fccbe064b3c211

    SHA512

    c5f0ae21a5ef7fdebf90249e773303e6b7e3eecdcd6bbd5b3320797fdca06c7078730d75240836cbe652fdc4879ad04f680f9bb4d522651161e3fbb4f26dcd40

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ejducla.ppt

    Filesize

    512B

    MD5

    97420011bfb56c50f8f98d2b1b74dc71

    SHA1

    ee39a404d560e71534f3144619114d852287f283

    SHA256

    bd3ab0bfafcc104ed7d5b9c4ca969aad05a19707a7ad34401ccbe3b0d437aa8a

    SHA512

    d180679c24618dde1df03667ba458e849584e54c2919f45b3127d6289bae08160c97c71f85770f9aebf8c7764b771e6e05a894200a00d52323466e5df1ddad9e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hmulc.mp3

    Filesize

    653B

    MD5

    d830b5dd2a7b4b0eec44a74f4b497472

    SHA1

    8053961fe3eabab0a6dbbc42079e93bf4bf62f83

    SHA256

    dd1a6cbf6e012a5a397857aa78603abcd2e93c540fd3126d37c0403939c70da3

    SHA512

    c4546a56ac817f588de3efe4669ce05232ba09d3119999be65ebaf66d2c87a58010d674a3118e011ee3725c33a14eba8827c3ab74e65c6bf72936a9fcc7adf01

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\itjixqser.icm

    Filesize

    529B

    MD5

    910ff4051c0a98c263f0b2023326071e

    SHA1

    9684ddea79232f59d4d9305d74c6ec3d5dfae3bc

    SHA256

    405adf33dffe403db4cc9336c442f09ff348084b771c42cfc4e0b94b2aa0146f

    SHA512

    cb6c8fb76424ca20889abb5f1d306ce541a60b3ecbf9fa41574700f02cf410b71ee78d4fdb731465273f4523cceafcf7289363d962f1b158a8b74a8c701a29b3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kebm.exe

    Filesize

    540B

    MD5

    607f6ecc09425ac3bc1cc2b71dedc7ff

    SHA1

    d3607a047061a68affb7a7bc3eabd1f0f0e5bd7b

    SHA256

    d48fc81c2e91a75dd7e13ee9ab501e5ac39a13b196bcfe64b71e88297896b514

    SHA512

    d1f14344c6e0a833e9ce703d94919a979a2bfb832dca48c23a16613c21609b547bba758d85d32c4d5703970c26fc88ded00a35c15a47977f5e9eb22459704363

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kerbfiuttw.ppt

    Filesize

    594B

    MD5

    203d967093efb43a020b58694ed5dfba

    SHA1

    c15d69530e65ddc14c6458176835238eae799097

    SHA256

    c35ffc17bf55d904d312bd5a28f80ab01804f65b0502196dafbb97b4dfa3c24e

    SHA512

    4488de767c686ea30e79e1346f553a4dca5864e6caa283c8fe3ac453712dc3203519df2bb5eb0ddcb920e3968f7a75b127094cc7e9ef854ee7c23c1104fdc116

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lobw.vbe

    Filesize

    65KB

    MD5

    b63bd119aa6e07bc2f9b941d761eeec8

    SHA1

    e3443a2879e8bedee4b6490b0a38639388a29f39

    SHA256

    fd25b764547d6cd317e5b5ff29adb5fad84d07035934cb28a4075719fa28a4d5

    SHA512

    364d2d3b7f7b30093a78bc0d1c79d0943261af3fd0c7d6af8355f501a321b4183af160c384c33ad453ff9c4c0b87985c6f69dbf6625a28a5ea0ba36f6709766f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lphkrgq.exe

    Filesize

    592B

    MD5

    1c1bb0fa64a11a9de7542ca43a748f6a

    SHA1

    e1374f083f66586c998ef7e13be45396a31eba6b

    SHA256

    5e1e3a2ffdaaf15a63c2df6d7420aded689fcac7d7e18c8dd0c10c98faa6a9b0

    SHA512

    b23fcdf9bdf8c838085a77367d6f79626fd664c1b2ae211acd7c1449288f4296df0945868be11d09672abfa294a5c068d66d774adeefa24a2b900ace1826482a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mgwcxrnk.3gp

    Filesize

    531B

    MD5

    8d5d2bcdde2e11e02490a4c669cc6fda

    SHA1

    73a5bfe0db16745aa7a9a243645aef2093568995

    SHA256

    bea987ef9bf82843991bc23f6aeb4f45305a55abccb3932cdf99a76aebbe5d96

    SHA512

    6a70015fbfcb42bd219332e4f0da0ddc48d44eee161cd3782751e65ba09af55866858acd403de75e2383ff292685b9b9d1cc7d1aed70a90abc0e179cf1bdb1aa

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mtkecifikl.mp3

    Filesize

    517B

    MD5

    c651eae5eca8cbcb1c38b58fe20d4175

    SHA1

    701b983922709075774c856cd1c14bc3b7698cee

    SHA256

    db6b427d4fd552fc4126357822e9fcae2ff617f15f1aad1d9a1989f13a25924b

    SHA512

    df0c873a9a16281ff2eccc9154444a7641c9c34db01b18d82757a594ac3bad0e0fecfee73659dc9b231af567eb053a5612ef94db55f56b80b9a689529bb297ff

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mufgjws.3gp

    Filesize

    548B

    MD5

    9b3e59a8969acd08602d8b1df64eb165

    SHA1

    c601aa8545de0c8bfbe51030ec9edaab37370c85

    SHA256

    70a42039584dfe587b465d2ef3c69b615938297fde7cf18142d6f4c647254e5b

    SHA512

    e4eb9b887038b9f1f789fd4beb71f26939719a7458dc951fb63a3dbb5cde6c15b7f89605c928c73e794d709df90238d6b025083a866bd075e06ffa3ddf1f8030

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pcwjpa.dat

    Filesize

    530B

    MD5

    3f9d4a73e6ca0ef4e6b831e44418124e

    SHA1

    9868584d48c037520e64061c184b8e8b54149001

    SHA256

    e769a4593d964a1e979c5c580708aab51f115ed7bc6fa28eb70d4963c9e300d2

    SHA512

    6ffd9e089f8bf418b57fe2e65475825c0ae611a85c89e4cb18e8e528c67672fbc117b1b80a0638b5d237af96d4006e2f4c12434af6192291bf0990601093c626

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pefe.mp3

    Filesize

    32KB

    MD5

    2d72840137bb8cf26578b51eb1a3f6f7

    SHA1

    fe6f156d2eb4ad6af72c402bb561d60d0486265a

    SHA256

    62cc51c657e5190b464d50301e20c5320d6eb751d5aec371d2d5a4f13f6e0db5

    SHA512

    938d88f8209761cb893dce8aa626a6759282eb5115610ae205d8d0354f7fc68b2ca04adf7bae4b80d05f25d3ec1142444166d2eedea709599b1f9d263fc0c04c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pefe.mp3

    Filesize

    32KB

    MD5

    3fafad1513e2fa732f47b3b0c6b3cccf

    SHA1

    d94854a366bbed5135b1f3c7c0c9f7f4cf35416a

    SHA256

    b62c68fa559cda02f715b1972102b8ee9e99a77cd5a006b81c5b553b415a9f1e

    SHA512

    cbc250669051e94c0b63fbcd446bd9205488f56fa60b29b9dacdad351e791e860650cad6671efbc6abaa8d5405e0b531db53aad91c4b33116f479d4e28400bb1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pvpeevmn.jpg

    Filesize

    591B

    MD5

    f416d391a74194bdcb8f1f1d18e56cb9

    SHA1

    a735ab03dbae8ac8dc1da77f0caf4927009967dc

    SHA256

    975e75af391ee0fdaa7b5dde07f0570f065aeabcf4cdccf97371ee8b6afad135

    SHA512

    72cada058891e4e681e5b3604f2ca6e924ecd833bf81d109c65c7e8e61ffcd4f7867734a5c60f9955821dd6262415f5fab14754a19ebc1be684f97df2894153d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qpxiulbcs.icm

    Filesize

    555B

    MD5

    bc8f6749e1d55b50265a65cbe963667e

    SHA1

    ed83fc44f891f9f06d8673cf6fd00fbd7b7370c6

    SHA256

    1aead8c1b811012929eae645a172f157843154f4d6b10aaff8a08d7223d405fd

    SHA512

    40fa9b20565174704d3ae5a050adf79edb9008abfd0f4f37cc7cba11670308cd4544e6cf359dfee6c826e5150f1aa479d6554b95a1ea72e7bda54a9e52546bff

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tbpnk.xl

    Filesize

    557B

    MD5

    939213871f063f9dffe953c88dad2675

    SHA1

    94939a8d078daa130a6a31bef0932b3752a50764

    SHA256

    ae596f282ecb2a8553691bcdc24596b08a06513c81cf26b4b80707b30daaf539

    SHA512

    0a95ac67cc50bd338f67955cd0bace35a01956a5a6ab92e5f9d4319f6e381e19124602856740fcd1c83538e001aec2f774697e7298d0d298886d0eb6eacfb652

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tvckgt.ppt

    Filesize

    516B

    MD5

    617b8f04ac1b6449989f714c8309dc68

    SHA1

    394449de67ad3c05013f48333098f041c76a40e3

    SHA256

    83b3db3efcb7c0e91ed4d243f383ff0e3412281337de8a9f18507d58fa3bffc1

    SHA512

    294ea67c104c09225caefead3ca798c2e8c28c08fdd7aa2415578dc43e8fa218fc227a5955570ad65244c2a66148a93dc47b51e1d31d7b59121f149a63284643

  • C:\Users\Admin\AppData\Local\Temp\Tar98AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • memory/1972-148-0x0000000000820000-0x0000000001820000-memory.dmp

    Filesize

    16.0MB

  • memory/1972-154-0x0000000000820000-0x0000000001820000-memory.dmp

    Filesize

    16.0MB

  • memory/1972-151-0x0000000000820000-0x0000000001820000-memory.dmp

    Filesize

    16.0MB

  • memory/1972-156-0x0000000000820000-0x0000000000838000-memory.dmp

    Filesize

    96KB

  • memory/1972-153-0x0000000000820000-0x0000000001820000-memory.dmp

    Filesize

    16.0MB

  • memory/1972-150-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB