Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 08:48

General

  • Target

    4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe

  • Size

    32.0MB

  • MD5

    fb962c2aac3ebcb22bfe895c456a0d61

  • SHA1

    0d44b7262f2656c22479bd45b2b05ef0a1364ab8

  • SHA256

    4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908

  • SHA512

    e75c5ae61181dccc1fc375cbffea2b4375da19d04ba6895436bf51adbcb284d64654db9272320fe1c7b10fc561c696a0e9efc8b7020123b761567822196d1423

  • SSDEEP

    393216:h5nOYndLMIiWP/65X1Rme/o1NROh2gA/hcxVQU:7doIi/3R3/iJgyc7F

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

imperiodosabor.shop:8821

Mutex

wmplayer_Corporation

Attributes
  • delay

    1

  • install

    false

  • install_file

    wmplayer.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe
    "C:\Users\Admin\AppData\Local\Temp\4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath "C:\
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2736
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Public\Java.jar
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Public\Java.jar
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3244
        • C:\Program Files\Java\jre-1.8\bin\javaw.exe
          "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Public\Java.jar"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:820
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell "C:\Users\Public\wmplayer.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "C:\Users\Public\wmplayer.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Public\wmplayer.exe
          "C:\Users\Public\wmplayer.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Users\Public\wmplayer.exe
            "C:\Users\Public\wmplayer.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wmplayer.exe.log

    Filesize

    805B

    MD5

    58a9108e39c2ea50e65c23be3a9407cf

    SHA1

    fb21f7b9330aa1a77080a3243b81b49035102d7b

    SHA256

    6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

    SHA512

    93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    833e8fb234eba9ab2b6097ac05fca0c1

    SHA1

    7c2de9b3eb1677b28df7d1be194549ec77c745fb

    SHA256

    e17f96af6e74dba1df12753d2f56763c22f52f00c922409d57cb8b1df432cc18

    SHA512

    2c183a531a4bf664abf6de39b30ec65f33791275b60b120caf01398dfc513a62921503b7056ba06ac02672631aa8192b87c17d0a3c516628a44d9cc85aee4687

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    7773744a076c02e1dd2179ecb750a02d

    SHA1

    21ee6c592233d7518258bd2e40e4b6c9aed48564

    SHA256

    6b76edcca73ad60d7dd38dc840787e398964598010d85b711ec3945b1ad15233

    SHA512

    766fb75264d2a9c04fa769939acd7427a0bec1b4384bb51b80d672d209c809d561a88e9c97195c9eda1451f473ae463b3905d44fd5aadeadffb9980bf0d15038

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qkazfsdo.fcr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\Java.jar

    Filesize

    11.7MB

    MD5

    140358d217ba48ecedca00e8b03c5abe

    SHA1

    d6f089dc09ebf168b05809a404e65bf65f0920be

    SHA256

    164236fceac19b8b5ebf842b94b99c263f3225dba28da7138f424b0d8e3aeb67

    SHA512

    ea1e771edf89716d1424d791813f57b8fcee5544d401e450c98ba7866f86fb7876a64d83bc8b9d3bc51e4557420f92b415d01ec93e31668b60ae3705658845cd

  • C:\Users\Public\wmplayer.exe

    Filesize

    4.4MB

    MD5

    12acf1859f6fc1c824484be4b632dbee

    SHA1

    5b901f0d34364835d6ea4c473c313fad8854f448

    SHA256

    25419a12766ebfd2eda94dd191ae105974c1e48347c2d96e2097e579e7af286b

    SHA512

    d4ef083bc8b8b500e8503536767899d233e79d74c126d9ea2e51743fb3759101d7c0c503096c209f49406bdb082695b32634643372d928b72ed08116a85b9032

  • memory/820-103-0x0000026861680000-0x0000026861681000-memory.dmp

    Filesize

    4KB

  • memory/820-99-0x0000026861680000-0x0000026861681000-memory.dmp

    Filesize

    4KB

  • memory/2736-37-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-5-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-10-0x0000000005AE0000-0x0000000005B46000-memory.dmp

    Filesize

    408KB

  • memory/2736-20-0x0000000005C90000-0x0000000005FE4000-memory.dmp

    Filesize

    3.3MB

  • memory/2736-21-0x0000000006290000-0x00000000062AE000-memory.dmp

    Filesize

    120KB

  • memory/2736-22-0x0000000006340000-0x000000000638C000-memory.dmp

    Filesize

    304KB

  • memory/2736-26-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-35-0x0000000006850000-0x000000000686E000-memory.dmp

    Filesize

    120KB

  • memory/2736-24-0x000000006FE10000-0x000000006FE5C000-memory.dmp

    Filesize

    304KB

  • memory/2736-23-0x0000000007250000-0x0000000007282000-memory.dmp

    Filesize

    200KB

  • memory/2736-36-0x0000000007490000-0x0000000007533000-memory.dmp

    Filesize

    652KB

  • memory/2736-3-0x0000000073FFE000-0x0000000073FFF000-memory.dmp

    Filesize

    4KB

  • memory/2736-38-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-39-0x0000000007C00000-0x000000000827A000-memory.dmp

    Filesize

    6.5MB

  • memory/2736-40-0x00000000075C0000-0x00000000075DA000-memory.dmp

    Filesize

    104KB

  • memory/2736-41-0x0000000007630000-0x000000000763A000-memory.dmp

    Filesize

    40KB

  • memory/2736-42-0x0000000007840000-0x00000000078D6000-memory.dmp

    Filesize

    600KB

  • memory/2736-43-0x00000000077C0000-0x00000000077D1000-memory.dmp

    Filesize

    68KB

  • memory/2736-44-0x00000000077F0000-0x00000000077FE000-memory.dmp

    Filesize

    56KB

  • memory/2736-45-0x0000000007800000-0x0000000007814000-memory.dmp

    Filesize

    80KB

  • memory/2736-46-0x0000000007900000-0x000000000791A000-memory.dmp

    Filesize

    104KB

  • memory/2736-47-0x00000000078E0000-0x00000000078E8000-memory.dmp

    Filesize

    32KB

  • memory/2736-50-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/2736-9-0x0000000005370000-0x00000000053D6000-memory.dmp

    Filesize

    408KB

  • memory/2736-4-0x0000000004CD0000-0x0000000004D06000-memory.dmp

    Filesize

    216KB

  • memory/2736-8-0x00000000052D0000-0x00000000052F2000-memory.dmp

    Filesize

    136KB

  • memory/2736-6-0x0000000005400000-0x0000000005A28000-memory.dmp

    Filesize

    6.2MB

  • memory/2736-7-0x0000000073FF0000-0x00000000747A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3112-1-0x00000000004B0000-0x00000000024C8000-memory.dmp

    Filesize

    32.1MB

  • memory/3112-0-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

    Filesize

    4KB

  • memory/3112-59-0x00000000004B0000-0x00000000024C8000-memory.dmp

    Filesize

    32.1MB

  • memory/3112-56-0x00000000004B0000-0x00000000024C8000-memory.dmp

    Filesize

    32.1MB

  • memory/3112-2-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

    Filesize

    4KB

  • memory/3244-81-0x00000000058B0000-0x00000000058FC000-memory.dmp

    Filesize

    304KB

  • memory/3244-61-0x0000000005B80000-0x0000000005ED4000-memory.dmp

    Filesize

    3.3MB

  • memory/3680-5018-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5036-128-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-132-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-146-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-138-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-160-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-158-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-156-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-154-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-152-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-150-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-148-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-105-0x0000000006F10000-0x00000000074B4000-memory.dmp

    Filesize

    5.6MB

  • memory/5036-142-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-144-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-141-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-136-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-134-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-106-0x0000000006960000-0x00000000069F2000-memory.dmp

    Filesize

    584KB

  • memory/5036-130-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-126-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-124-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-122-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-120-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-118-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-116-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-114-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-112-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-110-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-108-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-107-0x0000000006740000-0x000000000695E000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-5010-0x0000000006A70000-0x0000000006ACE000-memory.dmp

    Filesize

    376KB

  • memory/5036-5011-0x0000000006AD0000-0x0000000006B1C000-memory.dmp

    Filesize

    304KB

  • memory/5036-5012-0x0000000006B80000-0x0000000006BD4000-memory.dmp

    Filesize

    336KB

  • memory/5036-104-0x0000000006740000-0x0000000006964000-memory.dmp

    Filesize

    2.1MB

  • memory/5036-94-0x0000000000710000-0x0000000000B7C000-memory.dmp

    Filesize

    4.4MB