Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/08/2024, 16:43

General

  • Target

    JUZGADO PENAL/07CITACION DE DEMANDA.exe

  • Size

    2.2MB

  • MD5

    d9530ecee42acccfd3871672a511bc9e

  • SHA1

    89b4d2406f1294bd699ef231a4def5f495f12778

  • SHA256

    81e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280

  • SHA512

    d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980

  • SSDEEP

    49152:rHOut2Bf0ajIM8XEEN6N0rE/I/vqn7krQEQusd5F:VbaMbXbE/I/SnwrQEQusd/

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

miguel2024.kozow.com:2020

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JUZGADO PENAL\07CITACION DE DEMANDA.exe
    "C:\Users\Admin\AppData\Local\Temp\JUZGADO PENAL\07CITACION DE DEMANDA.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f960f4a2

    Filesize

    780KB

    MD5

    7c9153b5edc971ca4e866b2f2e4ab7e7

    SHA1

    8a5fb7dba453131f162a630fb5be2c20b0f96510

    SHA256

    348d0ef6990f384cd34ebbee3235d695e1553d47a23a4a4299354e7f6dfbf62c

    SHA512

    befdcf76a5c2301200486c9b639e57afd86c62facfacaee156e77fc16c02319e2bafd3f0626626e4df6c579761490bc2ea4ab7158cb022e62f992756ae5df184

  • memory/2568-17-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/2568-11-0x00007FF88C1D0000-0x00007FF88C3C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2568-14-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/2568-13-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/2568-9-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/4440-20-0x0000000074CEE000-0x0000000074CEF000-memory.dmp

    Filesize

    4KB

  • memory/4440-24-0x0000000004FF0000-0x0000000005082000-memory.dmp

    Filesize

    584KB

  • memory/4440-31-0x0000000074CE0000-0x0000000075490000-memory.dmp

    Filesize

    7.7MB

  • memory/4440-30-0x0000000074CEE000-0x0000000074CEF000-memory.dmp

    Filesize

    4KB

  • memory/4440-29-0x0000000005CE0000-0x0000000005D46000-memory.dmp

    Filesize

    408KB

  • memory/4440-28-0x0000000006200000-0x000000000629C000-memory.dmp

    Filesize

    624KB

  • memory/4440-21-0x0000000000600000-0x0000000000616000-memory.dmp

    Filesize

    88KB

  • memory/4440-16-0x0000000072E50000-0x00000000740A4000-memory.dmp

    Filesize

    18.3MB

  • memory/4440-22-0x0000000074CE0000-0x0000000075490000-memory.dmp

    Filesize

    7.7MB

  • memory/4440-23-0x00000000053C0000-0x0000000005964000-memory.dmp

    Filesize

    5.6MB

  • memory/4440-25-0x0000000004FE0000-0x0000000004FEA000-memory.dmp

    Filesize

    40KB

  • memory/4684-1-0x00007FF88C1D0000-0x00007FF88C3C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4684-6-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/4684-0-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB

  • memory/4684-5-0x00000000743C3000-0x00000000743C5000-memory.dmp

    Filesize

    8KB

  • memory/4684-7-0x00000000743B0000-0x000000007452B000-memory.dmp

    Filesize

    1.5MB