Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-07-2024 21:53

General

  • Target

    Client.exe

  • Size

    47KB

  • MD5

    22fbde164ea9b7ff6cb091afdbdc90e6

  • SHA1

    1adf25d75b1d64c3a2d012bec5bdb91c98fb1dca

  • SHA256

    21c55fe4ef392c6fe171e2a79ca13e014260bb12bb5f20ec962771b9d8703a89

  • SHA512

    4e05a549462d9f231aa65c2709c556580230674be68df79c7446715df0aba02e4937a8ed1a1231557ae7d839e3aa08fbac873624b41ce224119ecee6b5602598

  • SSDEEP

    768:L19TQo2oIL4+M0+LiktelDSN+iV08YbygenuQN6vEgK/J/ZVc6KN:L1pQoVsktKDs4zb1FnkJ/ZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

tr3.localto.net:1604

tr3.localto.net:1798

tr3.localto.net:4262

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    VIRUSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSs.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Renames multiple (1711) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2660
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3500
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:2212
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
        1⤵
          PID:3420
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Drops file in Windows directory
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffcc155cc40,0x7ffcc155cc4c,0x7ffcc155cc58
            2⤵
              PID:1060
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1940 /prefetch:2
              2⤵
                PID:4704
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1712,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=1976 /prefetch:3
                2⤵
                  PID:2540
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=2208 /prefetch:8
                  2⤵
                    PID:4020
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3256 /prefetch:1
                    2⤵
                      PID:3088
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=3284 /prefetch:1
                      2⤵
                        PID:228
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,9896994908362219205,16494640416586555915,262144 --variations-seed-version=20240709-050124.519000 --mojo-platform-channel-handle=4440 /prefetch:1
                        2⤵
                          PID:4120
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                        1⤵
                          PID:3372

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.DiaSymReader.Native.amd64.dll

                          Filesize

                          1.8MB

                          MD5

                          e1cf659672e42c238af9639f26338675

                          SHA1

                          69e04e41f5e19bf65511d3b0ab46407cea5ec088

                          SHA256

                          afe36c35238f85aa4dc8797c54ede302acd0383ff6bc0573b8dfb8e58f7462a1

                          SHA512

                          328b29517dad732d89c453178e609522419a88653f00a2004a232a0f6b38a5a8055f5f9c0f297ad8f8c0d4f86e4084f6d9af018e74267a389165810ede3e77cd

                        • C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\D3DCompiler_47_cor3.dll

                          Filesize

                          4.7MB

                          MD5

                          e6e2306d03ae01ffebcdbb485fada3db

                          SHA1

                          2664cafc5f95871b3cf424bba0d315703276d9df

                          SHA256

                          9fb797078ebc62845650f0f449c0b9b7d4adb999395829a58123cdc626f4a202

                          SHA512

                          c3e2dd8b7b9569725f3c2a1b4682c58b78c056f712e5cde32afdbf42054eb3d5dd362ec4e1d1ea676644d643e386f97f3342acf3da5ce61718c365c3234d27a7

                        • C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\vcruntime140_cor3.dll

                          Filesize

                          116KB

                          MD5

                          0e196781ccccd781cf621916020efee2

                          SHA1

                          28faae49f59fef536cd912cef824a89867ab3434

                          SHA256

                          f062d4d02bf187200a1ad1775c519cf33713e23045a1a09dac41d02e2efa587b

                          SHA512

                          ab830aa6c6e09cef27e02782e5fe7c9387d32ee8946be703a4463b1c9712f260f2a244ee55fca6cb9cd0b425695ef9ab700715b8177becb1dbeaa3e828c0f70a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          a8693cd4508b650ed8682aa1a17281de

                          SHA1

                          8a24e9f139749c3558758315cc43e73d155dcb61

                          SHA256

                          4c4bdb87890831133dd6bc5899d87e0a464353fddfa540f4cad995ee55b9ce18

                          SHA512

                          d1ce95d235db3205f324ad4dba2871c86f24207355dce6da947e0dd57a721917817dd7b129be31e13b7544643c51279204beeb94130b21706b391a85d2a6e6fc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          356B

                          MD5

                          a99e925c0243a03370c6f823532aa80d

                          SHA1

                          8f309879cb55f6eafddd87dea564ad5259d615ea

                          SHA256

                          3ca0f2c9c96b870c244fed3b3b9aa82780fc3b8cfba55f467baa7e8ad4fb44ef

                          SHA512

                          8d5aea2cb93b38c98b41efa936323171f6db71befb05d3e44b56a331724fcda7087d77f852fc57a608e4460665fe92174f4ecdbb62ed725115c69f3c82176e7d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          420975b19d6cbda877a2ee31ddb7cb8e

                          SHA1

                          d2ec5d2fa9d387e44e784a3fb455c1146874a3e5

                          SHA256

                          1c2820abae0a6a1fc255af7c54f4e80400e4e39fcc5699962591ca6fcaf55483

                          SHA512

                          731817efa84b5ce00a7b9e7757be42964a5d0279e09ddfbf3ba1bc4902c2283f27c01b7fd999c22240afcf6cf430e571b6dd5ded175987e15748b1b48bb0b1b9

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          92KB

                          MD5

                          41d01edac06d453f2a24e90f0e509637

                          SHA1

                          374526babfcf6782ecc831f60dfe37fb3e6f95eb

                          SHA256

                          b5599a3316f5ecaae8871f3789fedbf6efec538956efb81e79ff0714066a1d8a

                          SHA512

                          b5e7af32701cd8b67091a28899f3f83a51468f33a70daf96c6d3678d3e632460d8b0aa8e778c1565167ff139b7ebff19f6df96739f94b77eac0356077bf8c63b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • memory/2660-10-0x000000001B4B0000-0x000000001B4CE000-memory.dmp

                          Filesize

                          120KB

                        • memory/2660-9-0x0000000002A20000-0x0000000002A30000-memory.dmp

                          Filesize

                          64KB

                        • memory/2660-8-0x000000001B470000-0x000000001B48E000-memory.dmp

                          Filesize

                          120KB

                        • memory/2660-7-0x000000001B420000-0x000000001B46C000-memory.dmp

                          Filesize

                          304KB

                        • memory/2660-6-0x000000001D100000-0x000000001D176000-memory.dmp

                          Filesize

                          472KB

                        • memory/2660-5-0x00007FFCC5F80000-0x00007FFCC6A42000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2660-0-0x0000000000810000-0x0000000000822000-memory.dmp

                          Filesize

                          72KB

                        • memory/2660-2-0x00007FFCC5F80000-0x00007FFCC6A42000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2660-1-0x00007FFCC5F83000-0x00007FFCC5F85000-memory.dmp

                          Filesize

                          8KB

                        • memory/2660-3710-0x000000001AE70000-0x000000001AE7E000-memory.dmp

                          Filesize

                          56KB