Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-08-2024 13:29

General

  • Target

    0b525c4353772a037df1a5815c64919b42b03ff92f4cb6a445367f46b7e82fd9.exe

  • Size

    909KB

  • MD5

    9da3fe2dc92314bbde5acb9fcc5ee627

  • SHA1

    67338ae6eaefbec732b72a31c909c4f9f3b09b56

  • SHA256

    0b525c4353772a037df1a5815c64919b42b03ff92f4cb6a445367f46b7e82fd9

  • SHA512

    ba5291821715d572d19871b494538d4a8cb68172518bdeb3c232740e31c9b0767ead41b1c234b56860a439e28d804b8fb7d41ddeffc943dd6b06cc1f4eb241b6

  • SSDEEP

    24576:Gf+4JO2iIzJJ4//3Udkj/9/5//sveidXG:zC/ii4X3Qk3M/2

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

C2

blue.o7lab.me:7777

server.underground-cheat.xyz:7777

Mutex

dtDtRWyW1m1g

Attributes
  • delay

    3

  • install

    false

  • install_file

    $77WinUpdate.exe

  • install_folder

    %AppData%

aes.plain
aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 4 IoCs

    Uses commandline utility to view network configuration.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b525c4353772a037df1a5815c64919b42b03ff92f4cb6a445367f46b7e82fd9.exe
    "C:\Users\Admin\AppData\Local\Temp\0b525c4353772a037df1a5815c64919b42b03ff92f4cb6a445367f46b7e82fd9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:1396
    • C:\Users\Admin\AppData\Local\Temp\pop3.exe
      "C:\Users\Admin\AppData\Local\Temp\pop3.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\unnqau.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\unnqau.exe"'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Users\Admin\AppData\Local\Temp\unnqau.exe
            "C:\Users\Admin\AppData\Local\Temp\unnqau.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4740
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ipconfig /release
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3492
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /release
                7⤵
                • System Location Discovery: System Language Discovery
                • Gathers network information
                PID:3704
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
              6⤵
                PID:3868
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                6⤵
                  PID:4772
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                  6⤵
                    PID:1764
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    6⤵
                      PID:1568
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      6⤵
                        PID:1916
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        6⤵
                          PID:748
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          6⤵
                            PID:1588
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                            6⤵
                              PID:1724
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                              6⤵
                                PID:2076
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                6⤵
                                  PID:368
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4216
                                  • C:\Windows\SysWOW64\ipconfig.exe
                                    ipconfig /renew
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    • Gathers network information
                                    PID:1344
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3696
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$77WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\$77WinUpdate.exe"' & exit
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3268
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /f /sc onlogon /rl highest /tn "$77WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\$77WinUpdate.exe"'
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:4784
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1DF.tmp.bat""
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3396
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 3
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:2688
                            • C:\Users\Admin\AppData\Roaming\$77WinUpdate.exe
                              "C:\Users\Admin\AppData\Roaming\$77WinUpdate.exe"
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4428
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                          2⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1928
                          • C:\Windows\SysWOW64\ipconfig.exe
                            ipconfig /renew
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Gathers network information
                            PID:2220

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_shfjherl.dn2.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\pop3.exe

                        Filesize

                        45KB

                        MD5

                        3b86abe4c79286ed06965c268968c03d

                        SHA1

                        64afe64ee719aa3526023a5f7edacd44db21bde4

                        SHA256

                        47a46de105177d826cbda74051f7f9d7bb95ed079c2e636743f9f04ad8c6c4a7

                        SHA512

                        68f108646437fd72622cd1f719b2092b095e67500502981c4b605c64acaa38c12f46a82e47318b405137e5112ff82ccb51bfbb953b67fd3d1e9a5de1c2874483

                      • C:\Users\Admin\AppData\Local\Temp\tmp1DF.tmp.bat

                        Filesize

                        155B

                        MD5

                        43bf127677b33c2c2cee428212014177

                        SHA1

                        34a37bfcfbbb2b8f44fac0db1d3b8d37e131cea7

                        SHA256

                        0a61f01471305a8a625af658932e750f8126792deb16d3d5569c83d966007551

                        SHA512

                        326e361cc6f2cbffde5b28c0f285e8e29f7d5ce7b6704f33620805c461518964155aefb658097225b3e17507180e9e13a331b27b7419e49f21e130aaf83d6cd8

                      • C:\Users\Admin\AppData\Local\Temp\unnqau.exe

                        Filesize

                        1.5MB

                        MD5

                        675d5f4f8c0a9c2bd46b8ee34db2ac04

                        SHA1

                        a372e425e669936d174914680f46d30540d3706c

                        SHA256

                        ceda1404b09b12e5c59e28d23d0f86df547ed25de42ed74742c91cafe8fdf70f

                        SHA512

                        b9471dd7279a7de5df4547304938b53ce4ff56d373716fb065af8831192d592e1e97e11ed4509c61a80f39a602644cf241e09056f39505b7e64f9fe7aec934c2

                      • C:\Users\Admin\AppData\Roaming\$77WinUpdate.exe

                        Filesize

                        41KB

                        MD5

                        3c94b02364ba067e6c181191a5273824

                        SHA1

                        a44d2d25e0c36bee0fd319f4b990a67d8c34e852

                        SHA256

                        56763f94d6998304d137f5c202fb2147da5f14a39f318c68a810fc351701486f

                        SHA512

                        4b8bbcd2c0105170142a2b1f74569fac542180953bde7bdc7625c4d17e860cbfcb818a6813aedff39fe6e13bd71cfd5e3b3187b984e81532a6ed5998bab89cb9

                      • memory/1880-1103-0x0000000006F60000-0x0000000006FF6000-memory.dmp

                        Filesize

                        600KB

                      • memory/1880-1100-0x0000000005920000-0x0000000005C77000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/1880-1096-0x00000000050D0000-0x0000000005136000-memory.dmp

                        Filesize

                        408KB

                      • memory/1880-1095-0x0000000005030000-0x0000000005052000-memory.dmp

                        Filesize

                        136KB

                      • memory/1880-1101-0x0000000005DD0000-0x0000000005DEE000-memory.dmp

                        Filesize

                        120KB

                      • memory/1880-1089-0x0000000005190000-0x00000000057BA000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/1880-1088-0x00000000025D0000-0x0000000002606000-memory.dmp

                        Filesize

                        216KB

                      • memory/1880-1102-0x00000000060C0000-0x000000000610C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1880-1104-0x0000000006EF0000-0x0000000006F12000-memory.dmp

                        Filesize

                        136KB

                      • memory/1968-52-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-1050-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1968-46-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-44-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-42-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-40-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-1041-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1968-38-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-36-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-1043-0x0000000004F10000-0x0000000004F5C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1968-1042-0x0000000004EB0000-0x0000000004F10000-memory.dmp

                        Filesize

                        384KB

                      • memory/1968-35-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-32-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-30-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-28-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-26-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-24-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-22-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-20-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-18-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-14-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-66-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-12-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-60-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-50-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-10-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-8-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-5-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-1045-0x0000000005130000-0x0000000005196000-memory.dmp

                        Filesize

                        408KB

                      • memory/1968-1044-0x0000000005090000-0x0000000005122000-memory.dmp

                        Filesize

                        584KB

                      • memory/1968-1046-0x00000000058D0000-0x0000000005E76000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/1968-48-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-1060-0x0000000006030000-0x0000000006084000-memory.dmp

                        Filesize

                        336KB

                      • memory/1968-1068-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1968-1070-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1968-0-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1968-1-0x00000000000E0000-0x00000000001CA000-memory.dmp

                        Filesize

                        936KB

                      • memory/1968-2-0x0000000004C40000-0x0000000004D20000-memory.dmp

                        Filesize

                        896KB

                      • memory/1968-3-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1968-4-0x0000000004D20000-0x0000000004E00000-memory.dmp

                        Filesize

                        896KB

                      • memory/1968-7-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-54-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-56-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-16-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-68-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-64-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-62-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/1968-58-0x0000000004D20000-0x0000000004DFA000-memory.dmp

                        Filesize

                        872KB

                      • memory/3696-1076-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3696-1066-0x0000000000400000-0x0000000000412000-memory.dmp

                        Filesize

                        72KB

                      • memory/3696-1069-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4428-1082-0x0000000001410000-0x000000000142A000-memory.dmp

                        Filesize

                        104KB

                      • memory/4428-1081-0x0000000000930000-0x000000000093C000-memory.dmp

                        Filesize

                        48KB

                      • memory/4740-1109-0x0000000005890000-0x0000000005A12000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/4740-1107-0x0000000000BF0000-0x0000000000D7C000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/4740-1111-0x0000000005A10000-0x0000000005B92000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/4740-2149-0x0000000005D80000-0x0000000005E84000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/4904-1071-0x0000000005060000-0x00000000050FC000-memory.dmp

                        Filesize

                        624KB

                      • memory/4904-1067-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4904-1063-0x0000000000370000-0x0000000000382000-memory.dmp

                        Filesize

                        72KB

                      • memory/4904-1084-0x00000000062E0000-0x0000000006356000-memory.dmp

                        Filesize

                        472KB

                      • memory/4904-1085-0x0000000006260000-0x00000000062C2000-memory.dmp

                        Filesize

                        392KB

                      • memory/4904-1086-0x00000000063B0000-0x00000000063CE000-memory.dmp

                        Filesize

                        120KB

                      • memory/4904-2035-0x0000000074A20000-0x00000000751D1000-memory.dmp

                        Filesize

                        7.7MB