Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 15:38

General

  • Target

    Invoice-541221.exe

  • Size

    11.0MB

  • MD5

    98427670752fdc1602d91149b17a1e91

  • SHA1

    bb178d4f00416007b33b909cb9604c72833500bf

  • SHA256

    dd57e25bab42325715b5ae27bf6578e309af829d8e7534db8f828b8dbc870120

  • SHA512

    8f2cfd77eb4d7dda1eb77b457669e7401af86f7c64c0b0f96002284d9d3092f9bb4985beeed1d41a5b8a7be0b846eef24d6dc5aed529a573f21d0b74d09d1e03

  • SSDEEP

    196608:9n6V8KNM5Fd4NpJMQ8rKI/ooTCuSq5aS6yqolsbBClg2Ml23Sl6LQgq:9n6qKafONpuQ8M2laxyLlACg2MUClv

Malware Config

Extracted

Family

asyncrat

Version

| Edit by Vinom Rat

Botnet

8/4/2004

C2

luxeloot.info:2005

Mutex

AsyncMutex_345JNFV3c

Attributes
  • delay

    3

  • install

    false

  • install_file

    ANON.EXE.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Drops startup file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 36 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice-541221.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice-541221.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\PDF READER\@New_x32DS.exe
      "C:\Users\Admin\AppData\Local\Temp\PDF READER\@New_x32DS.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Users\Admin\AppData\Local\Temp\PDF READER\@New_x32DS.exe
        "C:\Users\Admin\AppData\Local\Temp\PDF READER\@New_x32DS.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Users\Admin\AppData\Local\Microsoft\fontdrvhost.exe
          "C:\Users\Admin\AppData\Local\Microsoft\fontdrvhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3240
          • C:\Users\Admin\AppData\Local\Microsoft\fontdrvhost.exe
            "C:\Users\Admin\AppData\Local\Microsoft\fontdrvhost.exe"
            5⤵
            • Drops startup file
            • Suspicious use of SetThreadContext
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4616
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1004
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:8
    1⤵
      PID:4212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\PDF READER\@New_x32DS.exe

      Filesize

      12.5MB

      MD5

      8b6c26c4d58c33f807aac62bb60e5748

      SHA1

      73d46b6353f09bb05bfabda9c778e3f526599d4a

      SHA256

      91b4f35d3cf26bd02c76b20cad1641877f566fe6234f62dc021a1a2df7f11a58

      SHA512

      ebb5279fb0d5cac00bc63e045721f06e85a8ddebd6cc05720826695d50dac87b3b0c626e5e9875a6a3a212a3743297f268eccd891b13cad2214a2dbc4585de73

    • C:\Users\Admin\AppData\Local\Temp\_MEI32402\pip-22.3.dist-info\top_level.txt

      Filesize

      4B

      MD5

      365c9bfeb7d89244f2ce01c1de44cb85

      SHA1

      d7a03141d5d6b1e88b6b59ef08b6681df212c599

      SHA256

      ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

      SHA512

      d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\VCRUNTIME140.dll

      Filesize

      85KB

      MD5

      89a24c66e7a522f1e0016b1d0b4316dc

      SHA1

      5340dd64cfe26e3d5f68f7ed344c4fd96fbd0d42

      SHA256

      3096cafb6a21b6d28cf4fe2dd85814f599412c0fe1ef090dd08d1c03affe9ab6

      SHA512

      e88e0459744a950829cd508a93e2ef0061293ab32facd9d8951686cbe271b34460efd159fd8ec4aa96ff8a629741006458b166e5cff21f35d049ad059bc56a1a

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_bz2.pyd

      Filesize

      92KB

      MD5

      cf77513525fc652bad6c7f85e192e94b

      SHA1

      23ec3bb9cdc356500ec192cac16906864d5e9a81

      SHA256

      8bce02e8d44003c5301608b1722f7e26aada2a03d731fa92a48c124db40e2e41

      SHA512

      dbc1ba8794ce2d027145c78b7e1fc842ffbabb090abf9c29044657bdecd44396014b4f7c2b896de18aad6cfa113a4841a9ca567e501a6247832b205fe39584a9

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_cffi_backend.cp37-win_amd64.pyd

      Filesize

      177KB

      MD5

      daccb97b9214bb1366ed40ad583679a2

      SHA1

      89554e638b62be5f388c9bdd35d9daf53a240e0c

      SHA256

      b714423d9cad42e67937531f2634001a870f8be2bf413eacfc9f73ef391a7915

      SHA512

      99fd5c80372d878f722e4bcb1b8c8c737600961d3a9dffc3e8277e024aaac8648c64825820e20da1ab9ad9180501218c6d796af1905d8845d41c6dbb4c6ebab0

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_ctypes.pyd

      Filesize

      129KB

      MD5

      5e869eebb6169ce66225eb6725d5be4a

      SHA1

      747887da0d7ab152e1d54608c430e78192d5a788

      SHA256

      430f1886caf059f05cde6eb2e8d96feb25982749a151231e471e4b8d7f54f173

      SHA512

      feb6888bb61e271b1670317435ee8653dedd559263788fbf9a7766bc952defd7a43e7c3d9f539673c262abedd97b0c4dd707f0f5339b1c1570db4e25da804a16

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_hashlib.pyd

      Filesize

      38KB

      MD5

      b32cb9615a9bada55e8f20dcea2fbf48

      SHA1

      a9c6e2d44b07b31c898a6d83b7093bf90915062d

      SHA256

      ca4f433a68c3921526f31f46d8a45709b946bbd40f04a4cfc6c245cb9ee0eab5

      SHA512

      5c583292de2ba33a3fc1129dfb4e2429ff2a30eeaf9c0bcff6cca487921f0ca02c3002b24353832504c3eec96a7b2c507f455b18717bcd11b239bbbbd79fadbe

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_lzma.pyd

      Filesize

      172KB

      MD5

      5fbb728a3b3abbdd830033586183a206

      SHA1

      066fde2fa80485c4f22e0552a4d433584d672a54

      SHA256

      f9bc6036d9e4d57d08848418367743fb608434c04434ab07da9dabe4725f9a9b

      SHA512

      31e7c9fe9d8680378f8e3ea4473461ba830df2d80a3e24e5d02a106128d048430e5d5558c0b99ec51c3d1892c76e4baa14d63d1ec1fc6b1728858aa2a255b2fb

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\_socket.pyd

      Filesize

      75KB

      MD5

      8ea18d0eeae9044c278d2ea7a1dbae36

      SHA1

      de210842da8cb1cb14318789575d65117d14e728

      SHA256

      9822c258a9d25062e51eafc45d62ed19722e0450a212668f6737eb3bfe3a41c2

      SHA512

      d275ce71d422cfaacef1220dc1f35afba14b38a205623e3652766db11621b2a1d80c5d0fb0a7df19402ebe48603e76b8f8852f6cbff95a181d33e797476029f0

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\base_library.zip

      Filesize

      1000KB

      MD5

      8386cf8add72bab03573064b6e1d89d2

      SHA1

      c451d2f3eed6b944543f19c5bd15ae7e8832bbd4

      SHA256

      2eea4b6202a6a6f61cb4d75c78be5ec2e1052897f54973797885f2c3b24d202c

      SHA512

      2bb61f7fac7ecc7d5654756ae8286d5fd9e2730e6ac42f3e7516f598e00fd8b9b6d3e77373994bb31d89831278e6833d379f306d52033fa5c48a786ac67da2b2

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\clr_loader\ffi\dlls\amd64\ClrLoader.dll

      Filesize

      8KB

      MD5

      e8a52f61db8eb35ef3b8211bfbb821e9

      SHA1

      835d394badb777e9c7e4ef59c72a309500a3971e

      SHA256

      4942106eb2b86a37c63eba972a2c6c5870d4ae7535075bb5252556e2ff2357f6

      SHA512

      48e7f25ea4a4af1dc09fe594c25e8a962304922445a1e9708873cef4578a783eea913b59cc390d0e318c9d35995f01109b9a104b6176cd8cd081449988913626

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\libcrypto-1_1.dll

      Filesize

      3.2MB

      MD5

      cc4cbf715966cdcad95a1e6c95592b3d

      SHA1

      d5873fea9c084bcc753d1c93b2d0716257bea7c3

      SHA256

      594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1

      SHA512

      3b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\pyexpat.pyd

      Filesize

      198KB

      MD5

      6500aa010c8b50ffd1544f08af03fa4f

      SHA1

      a03f9f70d4ecc565f0fae26ef690d63e3711a20a

      SHA256

      752cf6804aac09480bf1e839a26285ec2668405010ed7ffd2021596e49b94dec

      SHA512

      f5f0521039c816408a5dd8b7394f9db5250e6dc14c0328898f1bed5de1e8a26338a678896f20aafa13c56b903b787f274d3dec467808787d00c74350863175d1

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\python37.dll

      Filesize

      3.6MB

      MD5

      c4709f84e6cf6e082b80c80b87abe551

      SHA1

      c0c55b229722f7f2010d34e26857df640182f796

      SHA256

      ca8e39f2b1d277b0a24a43b5b8eada5baf2de97488f7ef2484014df6e270b3f3

      SHA512

      e04a5832b9f2e1e53ba096e011367d46e6710389967fa7014a0e2d4a6ce6fc8d09d0ce20cee7e7d67d5057d37854eddab48bef7df1767f2ec3a4ab91475b7ce4

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\pythonnet\runtime\Python.Runtime.dll

      Filesize

      421KB

      MD5

      d94eea13862fa10cc55075a7b595c3ee

      SHA1

      af8607c0a6f67917d5f9d9136d7b981caaaa6a32

      SHA256

      22822869023482e6d15314a8cbd7cb700e5c1ef4d89ecff65ff4144b1840da79

      SHA512

      591359cdf1108297c49b68dc1c375f747aad19b0dc609fe625f0e8ed16d46804ae05a14c7fa3343493589bd3e5f6e8f485d7e54b1398c3f3881b4911cb38c643

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\pywin32_system32\pythoncom37.dll

      Filesize

      680KB

      MD5

      53cf89c12cd651b824bf19ea86822b7e

      SHA1

      da16db3464f268c202670d0b379c24e3cf8a886a

      SHA256

      1dd7f1beb75529a090e8157bac0cac3c55ed49579b48d8bcab6fc756931662fb

      SHA512

      3ad7c7c6ba790ae4f5eef055a4af1611b5b02331abe64a4923c699cafdeafd28da307d67d3a77ea2284f6824ed04300aa46a2e7f95d8a11acebc3a8d181d4e92

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\pywin32_system32\pywintypes37.dll

      Filesize

      133KB

      MD5

      f9d8093503c0eb02a2d30db794dbaa81

      SHA1

      d11ac482caef0a4f3b008644e34b5c962c69a3af

      SHA256

      47cfa248363c3e5e3c2fcd847bd73435890bac14c3403f2841fd5e138f936869

      SHA512

      c4ce86cecef6e2b3785f076667381f3e8e4b7d9e6e7c9e48d2fedde83670df61c51bdd852c3fadc826bee6025d9c22a1cd2f1ba255a7123047ac11e2ed262fdc

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\select.pyd

      Filesize

      26KB

      MD5

      fb4a0d7abaeaa76676846ad0f08fefa5

      SHA1

      755fd998215511506edd2c5c52807b46ca9393b2

      SHA256

      65a3c8806d456e9df2211051ed808a087a96c94d38e23d43121ac120b4d36429

      SHA512

      f5b3557f823ee4c662f2c9b7ecc5497934712e046aa8ae8e625f41756beb5e524227355316f9145bfabb89b0f6f93a1f37fa94751a66c344c38ce449e879d35f

    • C:\Users\Admin\AppData\Local\Temp\_MEI38402\win32\win32api.pyd

      Filesize

      136KB

      MD5

      ba792c828797ab1b1ec5062b12872540

      SHA1

      15745e8c75c7d46a08a2efc301c6d6f95d3676e9

      SHA256

      e86a8623f4532645419bd753baf239c77198a51c0663d5441ad6e8b56093f530

      SHA512

      0e5f02a25789d47a686a18186fd6811e1cecbbc3104b0b3135eea5cc99240c59a3c24a760f8fe77bca8bffa2b4b1e0c305c5f73a28af4f84772a67db00544b82

    • C:\Users\Admin\AppData\Local\Temp\nsw2F0B.tmp\NAct.dll

      Filesize

      206KB

      MD5

      f443be9a48ce3b6aab6ddefce7565983

      SHA1

      e3d313360ef71845a3e7ba7620325bb82ab4cfdb

      SHA256

      d1e5b5d887fe5de2efcf084cbfa2992a04c04524d36cbe350c8c1319266eaaa7

      SHA512

      b550ab575ce95d8342e20b394999e262788ff5cfa480fb80bf6540408fe2726747d80272e7bcac17f916995bff077a8ff0ce84d0d42c5c5024143634f3a71353

    • C:\Users\Admin\AppData\Local\Temp\nsw2F0B.tmp\UAC.dll

      Filesize

      14KB

      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/1004-279-0x0000000005900000-0x000000000599C000-memory.dmp

      Filesize

      624KB

    • memory/1004-278-0x0000000004C90000-0x0000000004C9A000-memory.dmp

      Filesize

      40KB

    • memory/1004-277-0x0000000004CA0000-0x0000000004D32000-memory.dmp

      Filesize

      584KB

    • memory/1004-280-0x0000000005860000-0x00000000058C6000-memory.dmp

      Filesize

      408KB

    • memory/1004-276-0x0000000005070000-0x0000000005614000-memory.dmp

      Filesize

      5.6MB

    • memory/1004-243-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2816-105-0x0000026F67860000-0x0000026F678D0000-memory.dmp

      Filesize

      448KB

    • memory/2816-106-0x0000026F4F370000-0x0000026F4F38A000-memory.dmp

      Filesize

      104KB

    • memory/2816-110-0x0000026F68400000-0x0000026F68422000-memory.dmp

      Filesize

      136KB

    • memory/2816-111-0x0000026F4F3C0000-0x0000026F4F3D0000-memory.dmp

      Filesize

      64KB

    • memory/2816-112-0x00007FF8875C0000-0x00007FF888081000-memory.dmp

      Filesize

      10.8MB

    • memory/2816-113-0x0000026F678A0000-0x0000026F678A8000-memory.dmp

      Filesize

      32KB

    • memory/2816-114-0x00007FF8875C0000-0x00007FF888081000-memory.dmp

      Filesize

      10.8MB

    • memory/2816-115-0x0000026F68430000-0x0000026F6847A000-memory.dmp

      Filesize

      296KB

    • memory/2816-116-0x00007FF8875C0000-0x00007FF888081000-memory.dmp

      Filesize

      10.8MB

    • memory/2816-167-0x00007FF8875C0000-0x00007FF888081000-memory.dmp

      Filesize

      10.8MB

    • memory/2816-108-0x0000026F4F3A0000-0x0000026F4F3A8000-memory.dmp

      Filesize

      32KB

    • memory/2816-98-0x0000026F4F3C0000-0x0000026F4F3D0000-memory.dmp

      Filesize

      64KB

    • memory/2816-103-0x00007FF8984C0000-0x00007FF8984CA000-memory.dmp

      Filesize

      40KB

    • memory/2816-102-0x0000026F4F2B0000-0x0000026F4F2BA000-memory.dmp

      Filesize

      40KB

    • memory/2816-99-0x00007FF8875C3000-0x00007FF8875C5000-memory.dmp

      Filesize

      8KB

    • memory/2816-107-0x0000026F4F360000-0x0000026F4F368000-memory.dmp

      Filesize

      32KB

    • memory/2816-109-0x00007FF8875C0000-0x00007FF888081000-memory.dmp

      Filesize

      10.8MB

    • memory/4616-241-0x00000242FE4E0000-0x00000242FE4FE000-memory.dmp

      Filesize

      120KB

    • memory/4616-240-0x00000242FE500000-0x00000242FE576000-memory.dmp

      Filesize

      472KB

    • memory/4616-238-0x00000242E52A0000-0x00000242E52AA000-memory.dmp

      Filesize

      40KB

    • memory/4616-239-0x00007FF898B90000-0x00007FF898B9A000-memory.dmp

      Filesize

      40KB