Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 15:02

General

  • Target

    [Leakcloud.fun] Link Skipper.exe

  • Size

    523.0MB

  • MD5

    b928c8e9fbdea0d3d904df7a09955640

  • SHA1

    3caec7a61590a0287d2c350da8439cf977f3ab7a

  • SHA256

    1f1407140a7a550335d170429646438cef0d37ec51a6378ac08c132e9e7d8420

  • SHA512

    7627815855b32eec15e358246f2764b517790afb7bdac6ada17ec3184c96397248f1ce1150d3efe54f779f0e290bb2d03b6124a6c6df2dd2c7cfadc0138a627a

  • SSDEEP

    49152:XJED040Mm05vldXLyY4huQNuZo+rGlYnqRK7xPNH6Yjs1hm0zydRtmSH07JS44iE:XCX5soNvqRK7dqSdzmy4JMdaP67

Malware Config

Extracted

Family

asyncrat

Version

true

Botnet

Link Skipper B

Mutex

RRAT_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    powershell Add-MpPreference -ExclusionPath C:\

  • install_folder

    Explorer.exe

  • pastebin_config

    http://pastebin.com/raw/KKpnJShN

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe
    "C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C powershell Add-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4652
    • C:\Users\Admin\AppData\Local\Explorer\a.exe
      "C:\Users\Admin\AppData\Local\Explorer\a.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath C:\
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1452
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp947F.tmp.bat""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:4644
        • C:\Users\Admin\AppData\Roaming\Explorer.exe
          "C:\Users\Admin\AppData\Roaming\Explorer.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4776
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2932
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1792
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:348
    • C:\Users\Admin\AppData\Local\Explorer\a.exe
      "C:\Users\Admin\AppData\Local\Explorer\a.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4172
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4964
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9AE8.tmp.bat""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1008
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:944
        • C:\Users\Admin\AppData\Roaming\Explorer.exe
          "C:\Users\Admin\AppData\Roaming\Explorer.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Explorer\a.exe

    Filesize

    66KB

    MD5

    cbc180230a3a7ceb6b8fbc0db93ec087

    SHA1

    52581710e27859a616da384a90dfeea2a522c77a

    SHA256

    91ed933e574ad7c5278eb73a97f407ab419e5c6aa051b66cc7309d7154b2bd3d

    SHA512

    ce897082beb704eee8ebbd19c4ee557762bca1be170a63f9e60b991c65dfeed1d91d2187c3f6f833a67ee5e3ab6ea514ba946509b2ebe95f9e1cf9be8d22ab1e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a.exe.log

    Filesize

    522B

    MD5

    acc9090417037dfa2a55b46ed86e32b8

    SHA1

    53fa6fb25fb3e88c24d2027aca6ae492b2800a4d

    SHA256

    2412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b

    SHA512

    d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    d28a889fd956d5cb3accfbaf1143eb6f

    SHA1

    157ba54b365341f8ff06707d996b3635da8446f7

    SHA256

    21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

    SHA512

    0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ituteyrd.hbf.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp947F.tmp.bat

    Filesize

    152B

    MD5

    0f7d97eaef1ed2ffd38f70fda80140b5

    SHA1

    51aa78c4a3b0a626b192aa71c5d9760fa1a07eb6

    SHA256

    e76d2d343417ba79bc2259812a95df036929a7a7c5a0f22adf70649a598f687a

    SHA512

    e39b6b1b2862ce08c1924a40fcd973fb41a25d3decf56d5626d7e01a72a62c75560987452611d12979c580ff602c2bcf58a408d3827052e0c162026a9d06956e

  • C:\Users\Admin\AppData\Local\Temp\tmp9AE8.tmp.bat

    Filesize

    152B

    MD5

    21e93f4772e366cbfc04c0666c5bd9a6

    SHA1

    924d19ae653b4a1b35f4f50fe8563a21235d6c6b

    SHA256

    1411de806e6d3afba7c25bbe7c3dbe24cc44f848c7dadfb96104da700d82b1a1

    SHA512

    742759843f300e01e7758488d9721f1e4f20d0c222d5b5a7d6c1ea5947e4ea5cbd5d404e9001328cf5e48f4cfd9193aef3d44988aa3667865c5d30bddc9c44b4

  • memory/1572-76-0x0000000006DE0000-0x0000000006E83000-memory.dmp

    Filesize

    652KB

  • memory/1572-64-0x00000000061C0000-0x00000000061F2000-memory.dmp

    Filesize

    200KB

  • memory/1572-79-0x0000000006F80000-0x0000000006F8A000-memory.dmp

    Filesize

    40KB

  • memory/1572-92-0x0000000007230000-0x0000000007238000-memory.dmp

    Filesize

    32KB

  • memory/1572-90-0x0000000007250000-0x000000000726A000-memory.dmp

    Filesize

    104KB

  • memory/1572-89-0x0000000007150000-0x0000000007164000-memory.dmp

    Filesize

    80KB

  • memory/1572-88-0x0000000007140000-0x000000000714E000-memory.dmp

    Filesize

    56KB

  • memory/1572-82-0x0000000007110000-0x0000000007121000-memory.dmp

    Filesize

    68KB

  • memory/1572-81-0x0000000007190000-0x0000000007226000-memory.dmp

    Filesize

    600KB

  • memory/1572-65-0x000000006FEC0000-0x000000006FF0C000-memory.dmp

    Filesize

    304KB

  • memory/1572-77-0x0000000007550000-0x0000000007BCA000-memory.dmp

    Filesize

    6.5MB

  • memory/1572-45-0x0000000000E70000-0x0000000000EA6000-memory.dmp

    Filesize

    216KB

  • memory/1572-46-0x0000000004ED0000-0x00000000054F8000-memory.dmp

    Filesize

    6.2MB

  • memory/1572-75-0x0000000006200000-0x000000000621E000-memory.dmp

    Filesize

    120KB

  • memory/1572-48-0x0000000004E20000-0x0000000004E42000-memory.dmp

    Filesize

    136KB

  • memory/1572-49-0x0000000005570000-0x00000000055D6000-memory.dmp

    Filesize

    408KB

  • memory/1572-55-0x00000000055E0000-0x0000000005646000-memory.dmp

    Filesize

    408KB

  • memory/1572-60-0x0000000005750000-0x0000000005AA4000-memory.dmp

    Filesize

    3.3MB

  • memory/1572-78-0x0000000006F10000-0x0000000006F2A000-memory.dmp

    Filesize

    104KB

  • memory/1572-62-0x0000000005BE0000-0x0000000005BFE000-memory.dmp

    Filesize

    120KB

  • memory/1572-63-0x0000000005C10000-0x0000000005C5C000-memory.dmp

    Filesize

    304KB

  • memory/3056-120-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-114-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-47-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-0-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-122-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-121-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-7-0x000002A7FF830000-0x000002A7FF874000-memory.dmp

    Filesize

    272KB

  • memory/3056-93-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-5-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-8-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB

  • memory/3056-119-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-118-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-6-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-117-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-116-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-4-0x00007FF8E8073000-0x00007FF8E8075000-memory.dmp

    Filesize

    8KB

  • memory/3056-80-0x00007FF423790000-0x00007FF423B61000-memory.dmp

    Filesize

    3.8MB

  • memory/3056-3-0x00007FF907110000-0x00007FF907120000-memory.dmp

    Filesize

    64KB

  • memory/3056-1-0x00007FF423790000-0x00007FF423B61000-memory.dmp

    Filesize

    3.8MB

  • memory/3056-106-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB

  • memory/3056-109-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-110-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-111-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-112-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-113-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-2-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/3056-115-0x00007FF65D800000-0x00007FF65E6CC000-memory.dmp

    Filesize

    14.8MB

  • memory/4496-83-0x00000000060A0000-0x000000000613C000-memory.dmp

    Filesize

    624KB

  • memory/4496-43-0x0000000000FC0000-0x0000000000FD6000-memory.dmp

    Filesize

    88KB

  • memory/4652-9-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB

  • memory/4652-10-0x0000027A16610000-0x0000027A16632000-memory.dmp

    Filesize

    136KB

  • memory/4652-20-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB

  • memory/4652-21-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB

  • memory/4652-41-0x00007FF8E8070000-0x00007FF8E8B31000-memory.dmp

    Filesize

    10.8MB