Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-08-2024 13:24

General

  • Target

    4874508b4662cdbe145b4c70f86c70c7ce3237730098e41a67f2a961bd048953.exe

  • Size

    885KB

  • MD5

    3293e76bde33e374df998dc83874f03b

  • SHA1

    44a13df0874936715bbb6ec9bb698bedc268c7e9

  • SHA256

    4874508b4662cdbe145b4c70f86c70c7ce3237730098e41a67f2a961bd048953

  • SHA512

    f37a23cadbb30996a3f2a56babd9b513c53134546f5976941e33b3b635a290e3fd5313657db249309dba97993ade6712f6a7c4a6f0f93df10f14b80e7f3662f2

  • SSDEEP

    24576:HgEiAtVt8pxvgl12Em7BxpsCAz4KGQmE/G/cIK:bbuppgPMxqCIGPcIK

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

C2

blue.o7lab.me:7777

server.underground-cheat.xyz:7777

Mutex

dtDtRWyW1m1g

Attributes
  • delay

    3

  • install

    false

  • install_file

    $77WinUpdate.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 4 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4874508b4662cdbe145b4c70f86c70c7ce3237730098e41a67f2a961bd048953.exe
    "C:\Users\Admin\AppData\Local\Temp\4874508b4662cdbe145b4c70f86c70c7ce3237730098e41a67f2a961bd048953.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:2404
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lbkege.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lbkege.exe"'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4256
          • C:\Users\Admin\AppData\Local\Temp\lbkege.exe
            "C:\Users\Admin\AppData\Local\Temp\lbkege.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3224
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ipconfig /release
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1072
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /release
                7⤵
                • System Location Discovery: System Language Discovery
                • Gathers network information
                PID:2992
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
                PID:964
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                6⤵
                  PID:4036
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  6⤵
                    PID:1164
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    6⤵
                      PID:1188
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      6⤵
                        PID:4820
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        6⤵
                          PID:3324
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          6⤵
                            PID:576
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            6⤵
                              PID:4464
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              6⤵
                                PID:2896
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                6⤵
                                  PID:1236
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1552
                                  • C:\Windows\SysWOW64\ipconfig.exe
                                    ipconfig /renew
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Gathers network information
                                    PID:544
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4832
                          • C:\Windows\SysWOW64\ipconfig.exe
                            ipconfig /renew
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Gathers network information
                            PID:492

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ybakz4vk.12k.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\lbkege.exe

                        Filesize

                        1.5MB

                        MD5

                        3ccc507ced5e51c1cf03a2f7e38ff18a

                        SHA1

                        b121b76a0f425a029b49ba8e866818408a1395b9

                        SHA256

                        b9c141bd767a6c2a5d4a539017840631f59563bf541c8e62b8b9718e076170d6

                        SHA512

                        9a38d89659e2996b6a62ed0acdcedb532f1a073cd803c904305b39190e0b860a0dd50483845f288e35cb3c91a6ff499977f30d39d196b34800afc6ee38a5edbb

                      • memory/2708-1058-0x0000000006720000-0x0000000006796000-memory.dmp

                        Filesize

                        472KB

                      • memory/2708-2125-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2708-2124-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2708-1053-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2708-1052-0x0000000000400000-0x0000000000412000-memory.dmp

                        Filesize

                        72KB

                      • memory/2708-1056-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2708-1057-0x00000000054E0000-0x000000000557C000-memory.dmp

                        Filesize

                        624KB

                      • memory/2708-1060-0x0000000006800000-0x000000000681E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2708-1059-0x00000000066A0000-0x0000000006702000-memory.dmp

                        Filesize

                        392KB

                      • memory/3224-2123-0x0000000005970000-0x0000000005A74000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3224-1082-0x00000000007E0000-0x000000000096C000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/3224-1085-0x0000000005390000-0x0000000005512000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/3224-1086-0x0000000005530000-0x00000000056B4000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/3512-44-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-1047-0x0000000005FF0000-0x0000000006044000-memory.dmp

                        Filesize

                        336KB

                      • memory/3512-46-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

                        Filesize

                        4KB

                      • memory/3512-40-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-38-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-37-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-34-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-30-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-28-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-48-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-42-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-32-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-26-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-24-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-22-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-20-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-18-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-16-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-12-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-10-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-6-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-14-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-1041-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3512-1042-0x00000000057F0000-0x000000000584C000-memory.dmp

                        Filesize

                        368KB

                      • memory/3512-1043-0x0000000005850000-0x000000000589C000-memory.dmp

                        Filesize

                        304KB

                      • memory/3512-1045-0x0000000005960000-0x00000000059C6000-memory.dmp

                        Filesize

                        408KB

                      • memory/3512-1044-0x00000000059E0000-0x0000000005A72000-memory.dmp

                        Filesize

                        584KB

                      • memory/3512-1046-0x0000000006540000-0x0000000006AE6000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/3512-50-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-1049-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3512-52-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-54-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-1054-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

                        Filesize

                        4KB

                      • memory/3512-1055-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3512-56-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-58-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-60-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-62-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-66-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-1-0x0000000000A20000-0x0000000000B04000-memory.dmp

                        Filesize

                        912KB

                      • memory/3512-2-0x00000000055E0000-0x00000000056B8000-memory.dmp

                        Filesize

                        864KB

                      • memory/3512-68-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-4-0x0000000074E40000-0x00000000755F1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3512-3-0x00000000056C0000-0x000000000579A000-memory.dmp

                        Filesize

                        872KB

                      • memory/3512-5-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-8-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/3512-64-0x00000000056C0000-0x0000000005794000-memory.dmp

                        Filesize

                        848KB

                      • memory/4256-1077-0x0000000006FF0000-0x0000000007086000-memory.dmp

                        Filesize

                        600KB

                      • memory/4256-1078-0x0000000006350000-0x000000000636A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4256-1079-0x00000000063A0000-0x00000000063C2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4256-1076-0x0000000005E80000-0x0000000005ECC000-memory.dmp

                        Filesize

                        304KB

                      • memory/4256-1075-0x0000000005E30000-0x0000000005E4E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4256-1074-0x0000000005950000-0x0000000005CA7000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/4256-1070-0x0000000005870000-0x00000000058D6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4256-1064-0x0000000005090000-0x00000000050B2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4256-1063-0x0000000005110000-0x000000000573A000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4256-1062-0x00000000049B0000-0x00000000049E6000-memory.dmp

                        Filesize

                        216KB