Analysis

  • max time kernel
    26s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 13:05

General

  • Target

    8bd1977b9103ba367f4ef6dab9faeca0N.exe

  • Size

    58KB

  • MD5

    8bd1977b9103ba367f4ef6dab9faeca0

  • SHA1

    08e87dfef23486e089bf42cc9048297cdad48005

  • SHA256

    aa00ecf9f75092b10571a992d4a6c736939eef4b742cf0e735a1c7c4a7ee71eb

  • SHA512

    adb8d875752102220d18e1f067c9d58378f79538faa951edbb95a858128d21ad0520802013789a175de12ec6e6341d69f96bcdf206e6bf5ee6aa4958baca8b97

  • SSDEEP

    1536:PgdmilPJab/ZNKyLJeA/CTVIU9w2yCgP75dBAwQ4Dca:al3qNKoe8gVI+DgPNcw99

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

darknessdz.ddns.net:1177

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    10

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bd1977b9103ba367f4ef6dab9faeca0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8bd1977b9103ba367f4ef6dab9faeca0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\edge.exe
      "C:\Users\Admin\AppData\Local\Temp\edge.exe"
      2⤵
      • Executes dropped EXE
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\edge.exe

    Filesize

    48KB

    MD5

    b1337fc76c1e8f218b5dc4e87307a15d

    SHA1

    522439c505edc1388249034420af28b87e46727c

    SHA256

    16619eff9b177087be47f503b0cb2db02061637125a4ec7111bb54b828b95d0a

    SHA512

    c6f057cd82d6c01d7994520be3c5afc205fe1972b0bc5d583cc80aedcabc8a10c3bb43dcfb13f5a48362d99a4e07e127140a1211fadf52ddfd03251412774c1b

  • memory/1860-11-0x000007FEF5C73000-0x000007FEF5C74000-memory.dmp

    Filesize

    4KB

  • memory/1860-13-0x0000000000DD0000-0x0000000000DE2000-memory.dmp

    Filesize

    72KB

  • memory/1860-14-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

    Filesize

    9.9MB

  • memory/1860-15-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

    Filesize

    9.9MB

  • memory/2960-0-0x0000000074BFE000-0x0000000074BFF000-memory.dmp

    Filesize

    4KB

  • memory/2960-1-0x0000000000320000-0x0000000000334000-memory.dmp

    Filesize

    80KB

  • memory/2960-5-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2960-12-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB