Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2024 07:41

General

  • Target

    5c4e8e94fdb71b3ff3a21f09ac5139a3.exe

  • Size

    1.2MB

  • MD5

    5c4e8e94fdb71b3ff3a21f09ac5139a3

  • SHA1

    423a608f65cddad090bf6d157ab8b24ac033f105

  • SHA256

    ee3a8b076aed6d3f4dd52056b6fbcf62455a9258600b8e520551df9305dfb9fa

  • SHA512

    23962f4feb869e2fcfaad80386def9b13ed431cc4184e56a9a131169ae589a8bb399dd949640d098d942b6d38bf9b9b9f4cbd91f887b6e1a445d80874e946e33

  • SSDEEP

    24576:QUNxvqF6FGYJf6yjNQpNONZNlTX5PlGPgquLEIWxUc7N11QaSYx7GqFT:QUNxvC6FGYJf6yjNQpNONZnTX5PlGPgY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

anahowaanaa.ddnsfree.com:1111

Mutex

AsyncMutex_6SI8OkSS5

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c4e8e94fdb71b3ff3a21f09ac5139a3.exe
    "C:\Users\Admin\AppData\Local\Temp\5c4e8e94fdb71b3ff3a21f09ac5139a3.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\Documents\AutoHotkeyU64.exe
      C:\Users\Admin\Documents\AutoHotkeyU64.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\AutoHotkeyU64.ahk

    Filesize

    6KB

    MD5

    50b2fd640a95e3caf440bc3d8249c846

    SHA1

    46c7bd930438868a415b836b6aff4ca27cdf66f7

    SHA256

    d01e36c121b947001a82255fa8c767084daa0cee5f10f7816036aa87e2f4da9e

    SHA512

    a38b6b5bd38199bb08359750edc98c7d78f02f235ca530837ee2e5b6b6349bd96b132512e6db7f85da895f9ee4db3a791a97c59e4f543e9558dda02fa8797fa6

  • C:\Users\Admin\Documents\AutoHotkeyU64.exe

    Filesize

    1.3MB

    MD5

    2d0600fe2b1b3bdc45d833ca32a37fdb

    SHA1

    e9a7411bfef54050de3b485833556f84cabd6e41

    SHA256

    effdea83c6b7a1dc2ce9e9d40e91dfd59bed9fcbd580903423648b7ca97d9696

    SHA512

    9891cd6d2140c3a5c20d5c2d6600f3655df437b99b09ae0f9daf1983190dc73385cc87f02508997bb696ac921eee43fccdf1dc210cc602938807bdb062ce1703

  • C:\Users\Admin\Documents\str.txt

    Filesize

    206KB

    MD5

    5faebcef5aa3a89fd67a311f470bd7ae

    SHA1

    6b406724e0addfd21d39c5b7b004bc5548c1f4d0

    SHA256

    3f63892d771615d05ab2b884369f8dea2e0a36a2704ab2009762ed1f33892aff

    SHA512

    d54dfb9a54e5ac92468397a94e393022802be65312d317d660fcb70c00ea91b23fc1167a9bca0b5c83dcb3a18fc9b1677bf82bb00de888a8631fec103b19e337

  • C:\Users\Admin\Documents\test.zip

    Filesize

    659KB

    MD5

    ecfff2ef9131457dced515713825041d

    SHA1

    3709b6fddcdd2c30ad2b79d617264f8f94c52b96

    SHA256

    c2205bea1e3cc1adba1b40c00f810b6927bbe3d2c373973f8a62c39acb4320c7

    SHA512

    c24cf73b42663bb6aacc5b1d3f8b5853be659eed264fc6b1e05d9d999995a0c70b100b4c4b147b56f17195ac5d9cd219b2119234d33887d9e98807824d417e6d

  • memory/724-61-0x0000000074790000-0x0000000074F40000-memory.dmp

    Filesize

    7.7MB

  • memory/724-60-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/724-59-0x000000007479E000-0x000000007479F000-memory.dmp

    Filesize

    4KB

  • memory/724-62-0x0000000006080000-0x0000000006624000-memory.dmp

    Filesize

    5.6MB

  • memory/724-63-0x0000000005CB0000-0x0000000005D42000-memory.dmp

    Filesize

    584KB

  • memory/724-64-0x0000000005C70000-0x0000000005C7A000-memory.dmp

    Filesize

    40KB

  • memory/724-67-0x0000000006EB0000-0x0000000006F4C000-memory.dmp

    Filesize

    624KB

  • memory/724-68-0x00000000069A0000-0x0000000006A06000-memory.dmp

    Filesize

    408KB

  • memory/724-69-0x000000007479E000-0x000000007479F000-memory.dmp

    Filesize

    4KB

  • memory/724-70-0x0000000074790000-0x0000000074F40000-memory.dmp

    Filesize

    7.7MB