Analysis

  • max time kernel
    0s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 01:58

Errors

Reason
Machine shutdown

General

  • Target

    92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471.exe

  • Size

    798KB

  • MD5

    e34eb26af335bd435c40f82b3f8b48d0

  • SHA1

    e4b7b90c3cdb4e3db62544d0117454def485964c

  • SHA256

    92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471

  • SHA512

    922bd73e1797ece2979849a17a3bb788dc8316cab6fdf9f354fc6059e517c8a62d0d93c365c16e9fc8fef456f212213f7861cd3ed13c08a51cbcf63c816f58fd

  • SSDEEP

    12288:mLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QVc42F+DdfM:EfmMv6Ckr7Mny5QVF0EdE

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

LOGS

C2

72.11.142.133:4449

Mutex

orkxnmmqoswplswmucl

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471.exe
    "C:\Users\Admin\AppData\Local\Temp\92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1268
    • C:\Users\Admin\AppData\Local\overfertility\bankrupture.exe
      "C:\Users\Admin\AppData\Local\Temp\92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471.exe"
      2⤵
        PID:4832
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471.exe"
          3⤵
            PID:628
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 2360
              4⤵
              • Program crash
              PID:1580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 628 -ip 628
        1⤵
          PID:4808

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\overfertility\bankrupture.exe

          Filesize

          798KB

          MD5

          e34eb26af335bd435c40f82b3f8b48d0

          SHA1

          e4b7b90c3cdb4e3db62544d0117454def485964c

          SHA256

          92f2a11dbb3411bb3d30846bd6eec0b6411d5e03bf579c7f9d81c0fc649f1471

          SHA512

          922bd73e1797ece2979849a17a3bb788dc8316cab6fdf9f354fc6059e517c8a62d0d93c365c16e9fc8fef456f212213f7861cd3ed13c08a51cbcf63c816f58fd

        • memory/628-18-0x0000000075310000-0x0000000075AC0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-21-0x0000000005E50000-0x0000000005EB6000-memory.dmp

          Filesize

          408KB

        • memory/628-12-0x00000000007B0000-0x00000000007C8000-memory.dmp

          Filesize

          96KB

        • memory/628-13-0x000000007531E000-0x000000007531F000-memory.dmp

          Filesize

          4KB

        • memory/628-14-0x0000000005360000-0x0000000005904000-memory.dmp

          Filesize

          5.6MB

        • memory/628-16-0x0000000075310000-0x0000000075AC0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-17-0x0000000005090000-0x0000000005122000-memory.dmp

          Filesize

          584KB

        • memory/628-19-0x0000000005060000-0x000000000506A000-memory.dmp

          Filesize

          40KB

        • memory/628-52-0x0000000007090000-0x00000000073E4000-memory.dmp

          Filesize

          3.3MB

        • memory/628-53-0x0000000006DD0000-0x0000000006E1C000-memory.dmp

          Filesize

          304KB

        • memory/628-20-0x0000000005EF0000-0x0000000005F8C000-memory.dmp

          Filesize

          624KB

        • memory/628-22-0x0000000075310000-0x0000000075AC0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-24-0x000000007531E000-0x000000007531F000-memory.dmp

          Filesize

          4KB

        • memory/628-25-0x0000000006B00000-0x0000000006B76000-memory.dmp

          Filesize

          472KB

        • memory/628-26-0x0000000006B80000-0x0000000006CA2000-memory.dmp

          Filesize

          1.1MB

        • memory/628-27-0x0000000006AD0000-0x0000000006AEE000-memory.dmp

          Filesize

          120KB

        • memory/628-28-0x0000000075310000-0x0000000075AC0000-memory.dmp

          Filesize

          7.7MB

        • memory/1268-2-0x0000000004190000-0x0000000004390000-memory.dmp

          Filesize

          2.0MB

        • memory/4832-10-0x0000000003D00000-0x0000000003F00000-memory.dmp

          Filesize

          2.0MB