Malware Analysis Report

2025-04-13 12:36

Sample ID 240802-s2ggsavcjd
Target 85ccf4901d938844d57bed87ef9aa179df89505de4617e50a91600c288497bcb
SHA256 85ccf4901d938844d57bed87ef9aa179df89505de4617e50a91600c288497bcb
Tags
asyncrat discovery rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

85ccf4901d938844d57bed87ef9aa179df89505de4617e50a91600c288497bcb

Threat Level: Known bad

The file 85ccf4901d938844d57bed87ef9aa179df89505de4617e50a91600c288497bcb was found to be: Known bad.

Malicious Activity Summary

asyncrat discovery rat

AsyncRat

Unsigned PE

System Location Discovery: System Language Discovery

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-02 15:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-02 15:37

Reported

2024-08-02 15:39

Platform

win7-20240708-en

Max time kernel

141s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe"

Signatures

AsyncRat

rat asyncrat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe

"C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe"

Network

N/A

Files

memory/1968-0-0x0000000000400000-0x00000000018A2000-memory.dmp

memory/1968-3-0x0000000000400000-0x000000000185A000-memory.dmp

memory/1968-2-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

memory/1968-1-0x0000000077CC0000-0x0000000077CC1000-memory.dmp

memory/1968-4-0x0000000074CC0000-0x00000000753AE000-memory.dmp

memory/1968-6-0x0000000000400000-0x00000000018A2000-memory.dmp

memory/1968-8-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

memory/1968-9-0x0000000074CC0000-0x00000000753AE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-02 15:37

Reported

2024-08-02 15:40

Platform

win10v2004-20240802-en

Max time kernel

142s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe"

Signatures

AsyncRat

rat asyncrat

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe

"C:\Users\Admin\AppData\Local\Temp\b47c77d237243747a51dd02d836444ba067cf6cc4b8b3344e5cf791f5f41d20e.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4264,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp

Files

memory/3420-1-0x0000000077532000-0x0000000077533000-memory.dmp

memory/3420-3-0x00000000743BE000-0x00000000743BF000-memory.dmp

memory/3420-2-0x0000000077533000-0x0000000077534000-memory.dmp

memory/3420-0-0x0000000000400000-0x00000000018A2000-memory.dmp

memory/3420-4-0x0000000000400000-0x000000000185A000-memory.dmp

memory/3420-5-0x00000000743B0000-0x0000000074B60000-memory.dmp

memory/3420-6-0x0000000006850000-0x0000000006DF4000-memory.dmp

memory/3420-7-0x0000000006E00000-0x0000000006E92000-memory.dmp

memory/3420-8-0x00000000743B0000-0x0000000074B60000-memory.dmp

memory/3420-9-0x0000000006820000-0x000000000682A000-memory.dmp

memory/3420-11-0x0000000000400000-0x00000000018A2000-memory.dmp

memory/3420-13-0x00000000743BE000-0x00000000743BF000-memory.dmp

memory/3420-14-0x00000000743B0000-0x0000000074B60000-memory.dmp