Analysis

  • max time kernel
    54s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2024 19:49

General

  • Target

    Client.exe

  • Size

    170KB

  • MD5

    e29ab30e42348ecf2831928b7b95d5d8

  • SHA1

    70ae302ae078326efbe444fd8158d2b104a06a69

  • SHA256

    58b1013f511e61f2ddfb547939895ec161ab8bc03f5413529f85f1a3272d38d4

  • SHA512

    34a3209dc0856ea0e4d0573eca4dd53b238ebb317f10cb84683d99c64c1264693390d42193fcbac190ce9d9e0a33c9f32de8c4a57e4d38ec267ad16ad5d3138d

  • SSDEEP

    3072:3+STW8djpN6izj8mZw0YaeiJFqIPu/i9bVJ2cxO06+Wpz:c8XN6W8mm0YmfXPSi9bDD

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot5344934242:AAF3rLeFDCGd-IVKJG_PU99MSQjdKyNgeR0/sendMessage?chat_id=1619136628

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 12 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2944
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show profile
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:2064
      • C:\Windows\SysWOW64\findstr.exe
        findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1544
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:768
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:532
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2664
    • C:\Users\Admin\AppData\Local\Temp\Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Client.exe"
      1⤵
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2864
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:2596
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1868
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\places.raw

      Filesize

      5.0MB

      MD5

      533fa0d156958b754f04d378798605a5

      SHA1

      d98c7f2baa6c4318e872136ff31ee7e3c60af720

      SHA256

      e9684ca668f610af058f7185880564680946e3f5c722b29dfd441e7d08e52f14

      SHA512

      5a2c90a59d4c7b6cf7105de3aa8a12908b374d76502cc27732f809118d70dbabaead7fe531f6a14f7d58125a4ff200d71a97d358e09044f9023d1a9294b2d809

    • C:\Users\Admin\AppData\Local\Temp\tmp8797.tmp.dat

      Filesize

      92KB

      MD5

      df8f707fde4a4e68ffee7c48f6a9b7db

      SHA1

      6852a7a4c463c3853643439794ed130a41d0c90b

      SHA256

      dc4e84de932df42fc1d78aa17751a6e21e723ae60796cd400e0b01c26d1b0449

      SHA512

      9c99fb4dc2c7727a75a632e28d3d18b6b4736f4484720788f9410a4567bf4aa4ed74fc6448a6a7d7cdff7bb4787e906a0f1c4e05c41ba02473e900f6aee9b7ba

    • C:\Users\Admin\AppData\Local\Temp\tmp8799.tmp.dat

      Filesize

      148KB

      MD5

      90a1d4b55edf36fa8b4cc6974ed7d4c4

      SHA1

      aba1b8d0e05421e7df5982899f626211c3c4b5c1

      SHA256

      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

      SHA512

      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

    • C:\Users\Admin\AppData\Local\bcb319a67e76fc323354ac161a62680a\msgid.dat

      Filesize

      1B

      MD5

      cfcd208495d565ef66e7dff9f98764da

      SHA1

      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

      SHA256

      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

      SHA512

      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

    • memory/1048-0-0x000000007476E000-0x000000007476F000-memory.dmp

      Filesize

      4KB

    • memory/1048-1-0x0000000000250000-0x0000000000280000-memory.dmp

      Filesize

      192KB

    • memory/1048-2-0x0000000074760000-0x0000000074E4E000-memory.dmp

      Filesize

      6.9MB

    • memory/1048-73-0x0000000074760000-0x0000000074E4E000-memory.dmp

      Filesize

      6.9MB

    • memory/1048-77-0x000000007476E000-0x000000007476F000-memory.dmp

      Filesize

      4KB

    • memory/1048-78-0x0000000074760000-0x0000000074E4E000-memory.dmp

      Filesize

      6.9MB

    • memory/1048-84-0x0000000074760000-0x0000000074E4E000-memory.dmp

      Filesize

      6.9MB