Analysis

  • max time kernel
    300s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-08-2024 22:41

General

  • Target

    ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d.exe

  • Size

    426KB

  • MD5

    eafad63994d7226e68bb54d7a9396e91

  • SHA1

    acc49ad9a05403be2079f48954a397251a5b124b

  • SHA256

    ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

  • SHA512

    6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b

  • SSDEEP

    3072:bAa0zeTpio4F+B1MFnMUE2XAVLis8sIQaaBbnkuKMdcKQsd7WyxM1J0C1HzKyL:lTpq+w1MzaAVJ51LKMjpWy2J0oKyL

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

USA ONLY

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:5454

127.0.0.1:7898

127.0.0.1:8987

verygoodpc.line.pm:6606

verygoodpc.line.pm:7707

verygoodpc.line.pm:8808

verygoodpc.line.pm:5454

verygoodpc.line.pm:7898

verygoodpc.line.pm:8987

verygoodpcs.theworkpc.com:6606

verygoodpcs.theworkpc.com:7707

verygoodpcs.theworkpc.com:8808

verygoodpcs.theworkpc.com:5454

verygoodpcs.theworkpc.com:7898

verygoodpcs.theworkpc.com:8987

Mutex

mc-neo-host

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d.exe
    "C:\Users\Admin\AppData\Local\Temp\ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\roaming\myservices.exe,"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\roaming\myservices.exe,"
        3⤵
        • Modifies WinLogon for persistence
        • System Location Discovery: System Language Discovery
        PID:2228
    • C:\Users\Admin\AppData\Roaming\roaming\myservices.exe
      "C:\Users\Admin\AppData\Roaming\roaming\myservices.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:4544
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Users\Admin\AppData\Local\Temp\nebbvr.EXE
            "C:\Users\Admin\AppData\Local\Temp\nebbvr.EXE"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3660
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1824
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4532
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              5⤵
              • Drops startup file
              PID:3452
        • C:\Users\Admin\AppData\Local\Temp\regsvc.exe
          "C:\Users\Admin\AppData\Local\Temp\regsvc.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Users\Admin\AppData\Local\Temp\regsvc.exe
            "C:\Users\Admin\AppData\Local\Temp\regsvc.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regsvc.exe.log

      Filesize

      1KB

      MD5

      e555c48cb712a9597ecb55a60135d1f8

      SHA1

      2081c72d30c34ec3f61f9944545ecdaae11521f7

      SHA256

      815c80df060afa8acf7640ca011735ef77c66666d03901e04a8767827d5da4e9

      SHA512

      32129b5be15217e5400f1e7536270a703d62db60ebb06396b9d74703e6a0dcd2e78f7f42b2019093be1508a9310912f305b88de274a295c9135a4086cd8c8427

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pb3yurt0.qu4.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\nebbvr.EXE

      Filesize

      543KB

      MD5

      798523aa5971918115bd91d8810bf3d8

      SHA1

      7b80fee1e2a8a7a4de0238a9599f5f3f3b572fe2

      SHA256

      b99af57e6bf9ded4fabc5a7e82f703561bdf32d6eb49ddb9d25d3a664ab61376

      SHA512

      8941d811e80119314118a3669b579e5a8e3b082825775d7144af8f726962f8a0ec890ea99031fa22b1ddfde096f588d8da9f8f83be7d03cc82c5c357e1bd2387

    • C:\Users\Admin\AppData\Local\Temp\regsvc.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\regsvc.txt

      Filesize

      67B

      MD5

      49e5ecdcb4746cd255b423f6c23bdaf2

      SHA1

      be29152f8e3e0d2ec5ad713a13394679359a76bf

      SHA256

      d89c03318a20a1ad06155ed31927c3d8d400ae3465afdbb74dbc17d7f3a8bf65

      SHA512

      84307867800de095a174fa88719ac5ba9123de2e703708800e32a3449d6b538bda0ed5ca8ca2ba4caa060e81d34ceb6d4dd9dcd681c2bf6901e0286528c4ad38

    • C:\Users\Admin\AppData\Local\Temp\regsvc.txt

      Filesize

      67B

      MD5

      9faed7aa4a784ee53f4a3bc6e35165d2

      SHA1

      ddcaf0e18c88e9b2ddac51f0da8bc360c389f38c

      SHA256

      f3f73cb47af4582eba05d9ebce7796c732577a0d32059646fea291e13dd09770

      SHA512

      ad126918df94b995c8ae39e9e0a752651f1bbd7e881ffd0ecba60454e2adc96332f2704327f582f6ac54bfa77b84473fe5a5afe7eeebb638a1d5366323bf1305

    • C:\Users\Admin\AppData\Local\Temp\regsvc.txt

      Filesize

      67B

      MD5

      673cb4dda19ef63539aacf151bc8616e

      SHA1

      095e074b65be0f58cc8cb46fac093cd1a7f8d2df

      SHA256

      a58520373e71206a2f03aa97699675193d90dc3c518179967c3ff59170f1f3fa

      SHA512

      d17734b014efc98f06f626bbf9dd42ca8e926eafd44dc9284b375e8bc7412002ef87cc4a92092d68bf8a42174c5dcd5c1f6c960be94ec64a7a746ad0a614568a

    • C:\Users\Admin\AppData\Roaming\roaming\myservices.exe

      Filesize

      426KB

      MD5

      eafad63994d7226e68bb54d7a9396e91

      SHA1

      acc49ad9a05403be2079f48954a397251a5b124b

      SHA256

      ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d

      SHA512

      6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b

    • memory/1280-35-0x0000000000850000-0x000000000086A000-memory.dmp

      Filesize

      104KB

    • memory/2100-11-0x000000000CD60000-0x000000000CF22000-memory.dmp

      Filesize

      1.8MB

    • memory/2100-1-0x00000000003B0000-0x0000000000420000-memory.dmp

      Filesize

      448KB

    • memory/2100-0-0x000000007364E000-0x000000007364F000-memory.dmp

      Filesize

      4KB

    • memory/2100-12-0x000000000D460000-0x000000000D98C000-memory.dmp

      Filesize

      5.2MB

    • memory/2100-13-0x000000000C790000-0x000000000C7B2000-memory.dmp

      Filesize

      136KB

    • memory/2100-14-0x000000007364E000-0x000000007364F000-memory.dmp

      Filesize

      4KB

    • memory/2100-15-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/2100-9-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/2100-22-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/2100-3-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/2100-4-0x0000000007CA0000-0x000000000819E000-memory.dmp

      Filesize

      5.0MB

    • memory/2100-5-0x0000000007940000-0x00000000079D2000-memory.dmp

      Filesize

      584KB

    • memory/2100-10-0x000000000C650000-0x000000000C6B6000-memory.dmp

      Filesize

      408KB

    • memory/2100-2-0x00000000051F0000-0x000000000528C000-memory.dmp

      Filesize

      624KB

    • memory/2100-6-0x00000000081A0000-0x0000000008462000-memory.dmp

      Filesize

      2.8MB

    • memory/2100-8-0x0000000007910000-0x000000000791A000-memory.dmp

      Filesize

      40KB

    • memory/2100-7-0x0000000001390000-0x0000000001396000-memory.dmp

      Filesize

      24KB

    • memory/2148-28-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2148-48-0x0000000006E20000-0x0000000006E3E000-memory.dmp

      Filesize

      120KB

    • memory/2148-115-0x0000000007020000-0x00000000070DC000-memory.dmp

      Filesize

      752KB

    • memory/2148-116-0x00000000070E0000-0x00000000070EA000-memory.dmp

      Filesize

      40KB

    • memory/2148-46-0x0000000006D60000-0x0000000006DD6000-memory.dmp

      Filesize

      472KB

    • memory/2148-47-0x0000000006CE0000-0x0000000006D3C000-memory.dmp

      Filesize

      368KB

    • memory/3452-62-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/3452-68-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/3452-54-0x00000000005B0000-0x00000000005B2000-memory.dmp

      Filesize

      8KB

    • memory/3452-55-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/3452-63-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/3452-114-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/3452-67-0x0000000000C30000-0x0000000000CA2000-memory.dmp

      Filesize

      456KB

    • memory/4532-73-0x00000262EF8D0000-0x00000262EF8F2000-memory.dmp

      Filesize

      136KB

    • memory/4532-76-0x00000262EFBB0000-0x00000262EFC26000-memory.dmp

      Filesize

      472KB

    • memory/4536-27-0x000000000C6E0000-0x000000000C6E6000-memory.dmp

      Filesize

      24KB

    • memory/4536-25-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB

    • memory/4536-26-0x000000000C690000-0x000000000C6AA000-memory.dmp

      Filesize

      104KB

    • memory/4536-24-0x00000000008E0000-0x0000000000950000-memory.dmp

      Filesize

      448KB

    • memory/4536-23-0x0000000073640000-0x0000000073D2E000-memory.dmp

      Filesize

      6.9MB