Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 18:47

General

  • Target

    62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe

  • Size

    2.9MB

  • MD5

    5e985577ae17524bda2af7b183bbb0bb

  • SHA1

    041e93e1a56d37032fc2fb1f61481bcbcef04f8d

  • SHA256

    62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0

  • SHA512

    f2b3ac015705bd77c149a727413d8987cc018cc5ac3a48e3841ef7bade75e3a69497e77092e7eb0029c551043cf9af3657cd640cc23387b9703344dd0bf0acd2

  • SSDEEP

    49152:1IOY/SiSf6KSIshmgTlxRQv9rn0KtX2pyJz0qGoyEs:1kKZshhYv9ptXZJe

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

vhlcckztkbtpquk

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.ai/raw/bth2zeoztv

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • VenomRAT 2 IoCs

    Detects VenomRAT.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\62faa6629d18abb3b5f3a1137267ba32fd685bc8fd2de7b9b2b908d156511cf0.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\CELESTY.EXE
      "C:\Users\Admin\AppData\Local\Temp\CELESTY.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2452
    • C:\Users\Admin\AppData\Local\Temp\CLIENT.EXE
      "C:\Users\Admin\AppData\Local\Temp\CLIENT.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CELESTY.EXE

    Filesize

    2.7MB

    MD5

    c3009ee63bc661d9ea75eaeb256448ca

    SHA1

    45eb01150756df432e25eed44d976442473356de

    SHA256

    0bb88564a22bfd6d9ad6e4d8efa9077792a7b6094c2a0f865d70c43e11507352

    SHA512

    96f5847fbeef95df1309e97a4bc3d786a5f5c19b87e804f12d88b4473a0b50291c40407a3d95a2d5d78031f03be76da47f1846a73c7802ddae46a38ac4634e67

  • C:\Users\Admin\AppData\Local\Temp\CLIENT.EXE

    Filesize

    74KB

    MD5

    55f73c9b3197d7d7bb7156b04601c2f0

    SHA1

    bd40272e5b4dd5b3dd1c74c49fa40c59b7cf26da

    SHA256

    7c2cbfbb042e20dd4a785ece1d49dbcfd48711abed518531acaeacf6b65419ae

    SHA512

    27ff1a737e052299a2825d4467fc4a546a9fbc10302a9781d3701fa94d8e8be671bd9d37e2975561ab3f07a8fd72db1f78601c58d77519f0341d8595e0a2a68e

  • memory/700-27-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB

  • memory/700-19-0x00007FF8DF8A3000-0x00007FF8DF8A5000-memory.dmp

    Filesize

    8KB

  • memory/700-20-0x0000000000150000-0x0000000000168000-memory.dmp

    Filesize

    96KB

  • memory/700-23-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB

  • memory/700-24-0x00007FF8FDF7F000-0x00007FF8FDF80000-memory.dmp

    Filesize

    4KB

  • memory/700-25-0x00007FF8DF8A3000-0x00007FF8DF8A5000-memory.dmp

    Filesize

    8KB

  • memory/2452-30-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-33-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-28-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-29-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-21-0x0000000002710000-0x0000000002711000-memory.dmp

    Filesize

    4KB

  • memory/2452-31-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-32-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-26-0x0000000002710000-0x0000000002711000-memory.dmp

    Filesize

    4KB

  • memory/2452-34-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-35-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-36-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-37-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-38-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-39-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-40-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB

  • memory/2452-41-0x0000000000400000-0x00000000006DC000-memory.dmp

    Filesize

    2.9MB