Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 00:20

General

  • Target

    AsyncRAT/AsyncRAT.exe.xml

  • Size

    5KB

  • MD5

    cb1f2dcfeb5cbb5af8efa7ea40b8e908

  • SHA1

    ceb040761554040cac2fc7ca18623498d3bfc7ce

  • SHA256

    58f956abe9d717683f4a1cfa6f70e256c80461315a8d47b6456116b3d3075372

  • SHA512

    f0d805bb7983a111b7083e08d5e53c30dd78a0a5fa2baa2af6c5d3395475a3399fd085d151cc8cce312c7eb3e11ac7c2cc78c49ff8a9bfba4b6ad6585caeaeea

  • SSDEEP

    96:ur71Y7KY7KPrv0bGiver/apdgaRzV6RnwhXIJ0bGiveLapdgaRzV6RQyYKS4Ypy1:ur7S7L7OrTbCyYKS/pvrsJ+J/qJvr

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\AsyncRAT\AsyncRAT.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8847dd35998b62b08de7fe25dbf1255e

    SHA1

    d80417fd92cb9d413cd858733b9f1e86964053ab

    SHA256

    3ebebaea99b30382e6fdda10a33a8a2f1e88818327cc94659326339bcadc8aaa

    SHA512

    3b51c886bb9357c3e39f00a26facce95cad32b507d76c9cc36ad09cd3bb73a1e82ba475e5b9bef21fed519f2e8c150d284c7986498b28eb24db7e4ec73323421

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e125e98ec7112dd2ec65f4a3826d823

    SHA1

    6be74832aa6866e4d3ca2a9b9f0e2252fc689b36

    SHA256

    db0ecdd59b017f74def6799942de779dbef026023b6284cde1d72c30f7425fbb

    SHA512

    8b0fa22669801e0ff6b79f25afc0a5168142890b2112151f36dc1b1336fb10fd864dd17db5635290dd4db6b2d89cb22b90c94a5886749145fb546758d77e4a83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6169ef3a712ab6664cb011d4e334f743

    SHA1

    447012d8348cd1169a669ad53ab2e3ebf57c7e07

    SHA256

    e5f065a6a132dd0e63ae134b884b6cfa84e2e0439328da2779a5d459b9ef629a

    SHA512

    fb097fc75f6195b58554668b7aa9cb6a28d7dd73c296c845a501987b5673ac44346640ba8540099e4dba61306bd6f695a149e36c8336f4f18b5d514c8962819f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    417b096e9ac3bfa9971bbd0282c43387

    SHA1

    116d27b15cdbc64a9930908de40921ec07b0db6a

    SHA256

    9c097ce21e2f6d3cb337108e5a1a15ca0ffcd43a2fca916ef2bde7215f9e23b2

    SHA512

    3f9beceb34081cc681b406492b312c19d6c5bd210818666d00cb845581a189646bd064db964199e88a3886de3cce4827efc4acbfc609884db95099cd3eb00ec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eac1db19568559e8fa104a4b49aa51f9

    SHA1

    f69b88bdbc4f8954ef4fa4e38ba8a181a4addc20

    SHA256

    8259b40a0fa7bee44410844a10d1121ebcc73afe2190c76a851ef93c0b267cf2

    SHA512

    df537e18dbe22a5a9d72456e2cebb53c3402f03f291421ec35f5467deab12e323615c35f0f7bb90b5798ba4fa193b2f5a81a486ba44de8e31fe804b929f1300d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64206fe338757f2a9cdba74e71da2f05

    SHA1

    6b0fe8a38e531f788e2ad884640514918c093e9a

    SHA256

    fccb2fb0fef389cf05098e93d673c13b49c8d76d39fba855ea15c69dea8055b0

    SHA512

    ac51322bd710af0e98550865078e96092a39b7d03eb5dc28a074aca6dbdd2a6a300b9813dad31e32684b022ec55972612c8b85d8e932a4dc4257b53b07591d01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51d72cab37874fcf72c6786c8f34c1d7

    SHA1

    95beff7964783fcf70d0599e61c7aef201b0fd32

    SHA256

    a00027294af4b4be2d6814c398700138ab12e490b05b2a278ba4bcf3b3465039

    SHA512

    bc119fc887e5631328cd6dd5ddaf43547dcc437bd7008edf47d0d4de4ec67e27276b84d83b39941a768ec762b2ea6fb0917978d6f58fe7f51243c53c25bc42fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    231e395d5b8ca39cdd1b94ffdeb601a9

    SHA1

    52a68eed342e162eb34bc50e8adac57249676b83

    SHA256

    9db12d94514c47424fce7d6d7570087bd9bb0bba1980fd4a52a68f8ff17462fb

    SHA512

    d604a7185118562a99cc6edade4552b3c918fa08110cbfb9bd0a6615ed13644644bbbab8fb1591aa852fd3d3847c9b5b7cecd9c9d18af8b0184b0d1d376b9860

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4793c5ec13aed7d65c3f96e007871a30

    SHA1

    108e846e3989ae7a3bea2d1fe7bf0037c57abe0b

    SHA256

    c2dfddf2a64a483ebf24495003b98aa7e70a861d0e40f07235f0af3ad0e00003

    SHA512

    079f1152afdd67305199686adf7ade0fa641f65fa9eb63c18ee730b2c2271ac49ba325619849b0dd9597222523c761d415d0efd30c8ed84dd0976d9b75d6c40b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b4a9b6c8dbf2b04a31abf75226e12d3

    SHA1

    e7073ee2826ca7b1c53686c54f18dabf0248c944

    SHA256

    7c9390940c21218cd2455a53db642d330b8cefdcd992c479eabd5e1a470d1345

    SHA512

    b800bddb1bab938f84f8237ce8188b6a67229f8c937c487acf8ae3ee10183b57e822c79ca8b312e7567f7bf6652881cb8b2de9a74f6e716fa81e8a67c006b0fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e78c35dda74680e6a736cacd2c22dc8

    SHA1

    37854ef9c92bb9843fc38c8873d8ebafc3c29ddd

    SHA256

    89cfd42527b510488913c32243d389c4a56bc7682c3182c24885f3b6d6d46861

    SHA512

    a2605faac06cdbf4d696cb96c53bcba75cb89ee2fb37213d054a7c87dcd4d3da405d18f3db3adaabd6a6c0358aa9c1e43cb9b974e96b4ea91a5a569c2554ecf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f77687c2a2703f1a9e3c79321568ac9

    SHA1

    d6ba9ac123cac72d40df73f4ec884e0da3a32d35

    SHA256

    2c7e63ab8693ec256ff5b5edca6773c60d3cc96be5122510baaf1e70fb64d3e5

    SHA512

    bed3bb0b418bb923f7ef4964fdd439a90124f55b072a50214617496ae08bb23777b0305eb8af349b088a06927dcf84e0912bd422c426f0417fd794edfa0e4eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96d8e77c8a6fc361fa9b789f130632cb

    SHA1

    ffe72fa02de4158f9f6e161b69ea76ba7e951562

    SHA256

    57f94c64ef0c26ad15ae585447f1277f03c80e45fd272efb622981c76bc5362f

    SHA512

    d18aec090dbf09b4b6ac78b12a86695aa57f52878866050202e88a99e3894904be2e4296ca483e95d093fca49186037d9660023772fb4319f71d6f3c2f5ed4bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb66d20039afe31187d761d9e7b20a2c

    SHA1

    efb426d8912b1c3d9f592e90fca19512afc5b446

    SHA256

    1375292d37928f1937e224526d46eaa3efdbdb34eb07e18c9ef8dab62f51ee7e

    SHA512

    a126e14d245e922784c3ba96d8590d4ba19643bf27a5583ce5078d1dfbfb825d20791b44264c492a43539cfe16f317c3702a453a2eb20003c5ac34bfc2baff80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f354e9fbeb6fc19dd217c908240d6da

    SHA1

    c1328efe1ffe0c1ea185ae1806cc2512205ee4d1

    SHA256

    facf990910f5d0fd3ec2f4e9c5c0fb63de853e401cc8ac45d6736dac02b108e2

    SHA512

    8bb4ecdb531c6cb7fbbb4bf750888bc1a2f0c226820747c06903c7b4eda871cae8a6b9d1c27c9150860f797aa22c650d852c77b89252f1ce5476c43b3dc09bfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0099833298b8ae9b691ab9cbe6c3be51

    SHA1

    b628f360c95413d86706bb8624ba117a2aec0b51

    SHA256

    16a11e3c8487fc61a2567b041e71e544357435dd0cc552928a4010a2eb2374bd

    SHA512

    937b8f6b0929dc7f02763c75ec51f7364d2e3f81a2cc880d86f791055a876c0187b3abdd48caf466ac5b24b221b477efd3e889e952708b8b5c5faf3dd097abc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06fc8201206e26b18a532f813dfc273b

    SHA1

    b05d7b7ecb004f8135ac96a6a313fb84a669b1c5

    SHA256

    2b7cfd55f81c22965c06b479177dd2387977b6c59e255d52732cb785f015a1b7

    SHA512

    8672793c665b633bfe042242bd5f37a6c24e618ffcfe52501d085b5451470ca346a85886b1d22358862013f5035e3084e11c67bde54ad3f66ec62ab9ead263cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb13eddf23a59b34cbcd482aa895c4e0

    SHA1

    58118a4e51c221c651e96b3d205093af41a013b4

    SHA256

    cc7bbea0acbfb93300c0c5aa2ee6e1dac3604bbff11c88ac397f66e9c2b85fcc

    SHA512

    ad00fd6aaff2f10ef03ee92c010586247fe064fe2953cc0e879ad052d1c224ed2e97c027bd95d168c9276dac8d727215109fa1c39eaaf7dc7c4d9e40d9e3591f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5edf462b3d5f32fa97ceaaf742a323d3

    SHA1

    a9bf8b2fd689a350cb36b31666e8b8a74369e7e6

    SHA256

    aa19d77faa7feb6efa26e6285aa57b1cfa48baaa8ad86eab8cb5ab536d3d7f5a

    SHA512

    7bdd88eb9276aa0fc8d904d7eef9f3a2d0091973d0a775e29a2726365ab260f28419079123754f79db7601a23db1e88968cb1e2afa17b4ceaa465005ecb46454

  • C:\Users\Admin\AppData\Local\Temp\Cab64CD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar659C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b