Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 15:36

General

  • Target

    ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.exe

  • Size

    1.1MB

  • MD5

    2230841a64ab962447575dae04849d67

  • SHA1

    1ab7790add84fc1d6b919dc0652f4a7b0ae0925e

  • SHA256

    a8e8625363e9a40361b57f59e493291a20f95236095f3cb45263758685df410f

  • SHA512

    5393da9c3d09f66466e2eeb8349ea6fd6809f4e29070b82c91b1e0d83f22bc00943e0fe231293c48fde12969cdbc65afd00bdd2573eddf2684080a660286c1da

  • SSDEEP

    24576:nhQRY7mtnIcYEC+Iv9oydRZDmbZo0UkYtOzCon69fcIn7:ktn/YEWv9TdRZqbm7dseJ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7A

Botnet

FURIOSO

C2

furioso.con-ip.com:6606

Mutex

uuooxuxbnkywum

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.exe
    "C:\Users\Admin\AppData\Local\Temp\ANEXOS POR ENTE 2814629814815718645718465710846597201846597821406597804216956041285974218609572135465.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2600-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/2600-1-0x0000000000110000-0x0000000000224000-memory.dmp

    Filesize

    1.1MB

  • memory/2600-2-0x0000000004BC0000-0x0000000004CA0000-memory.dmp

    Filesize

    896KB

  • memory/2600-3-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-37-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-57-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-67-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-65-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-63-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-61-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-59-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-55-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-53-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-51-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-49-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-47-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-45-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-43-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-41-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-39-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-35-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-33-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-31-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-29-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-27-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-25-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-23-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-21-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-19-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-15-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-13-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-11-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-9-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-8-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-5-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-4-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-17-0x0000000004BC0000-0x0000000004C9A000-memory.dmp

    Filesize

    872KB

  • memory/2600-1076-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-1077-0x0000000004D90000-0x0000000004DEC000-memory.dmp

    Filesize

    368KB

  • memory/2600-1078-0x0000000004D30000-0x0000000004D7C000-memory.dmp

    Filesize

    304KB

  • memory/2600-1082-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-1083-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-1084-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-1085-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/2600-1086-0x0000000005930000-0x0000000005ED4000-memory.dmp

    Filesize

    5.6MB

  • memory/2600-1087-0x0000000005060000-0x00000000050B4000-memory.dmp

    Filesize

    336KB

  • memory/2600-1088-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/2600-1092-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4736-1093-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4736-1091-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/4736-1094-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB

  • memory/4736-1095-0x0000000074AD0000-0x0000000075280000-memory.dmp

    Filesize

    7.7MB