Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 09:30

General

  • Target

    zcxxz.exe

  • Size

    74KB

  • MD5

    4d3d13d39deb64c17ff692e8d9058d3a

  • SHA1

    3d44229b978878c06da6cc06534472745c44202b

  • SHA256

    7d2d2aec7b5689480509caf4b3f688a57b0b1d7aeb0e367a4b5d42c679b558cc

  • SHA512

    fb95bc8eec6e389e6ffec41daa1ed0786e737fcf97b8d0096e3e94f3f272a3e11a0d92b0addaa22554714756bf008b00b0b92955305d6858cd7a9ad9376a225e

  • SSDEEP

    1536:gUUPcxVteCW7PMVG07RhCI2H1bB/la3QzcyLVclN:gUmcxV4x7PMVrNhqH1bBo3QjBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:36414

Mutex

azxwblnxumphapq

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zcxxz.exe
    "C:\Users\Admin\AppData\Local\Temp\zcxxz.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5048
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe054fcc40,0x7ffe054fcc4c,0x7ffe054fcc58
      2⤵
        PID:4188
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:2
        2⤵
          PID:1208
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2196,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
            PID:1420
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:8
            2⤵
              PID:1860
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
              2⤵
                PID:4384
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3432,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3448 /prefetch:1
                2⤵
                  PID:1120
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4632,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3736 /prefetch:1
                  2⤵
                    PID:5052
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4748 /prefetch:8
                    2⤵
                      PID:4920
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:8
                      2⤵
                        PID:4360
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4928,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3864 /prefetch:8
                        2⤵
                          PID:3928
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,13908355734985358106,6865787050743166971,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:8
                          2⤵
                            PID:432
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:4264
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:1732

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              b6855f6189dac17c32a8259867ed752a

                              SHA1

                              dcbd2120c529479bad0132ef6253e8ed6b5d26e5

                              SHA256

                              86c4579c15305b04de114cd17a50f99502570ec048eb40bce2b40cc1648fa607

                              SHA512

                              0d0fb9f7a4b499848fca4bdc6c9d0a598ba87a25d4e80019976189da39dfe6c59baed7c8bda82ee016146211a9dfc8e13eb3da518dc1978ca65dfc53d06ad2b6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              f3283c824224636fdcabfd5de6959ac9

                              SHA1

                              be0268663cb52835aa2aec621e5a0cc8e08acd57

                              SHA256

                              69adce248776c5fc9ad72ffa9e112cbc1b26c589b6018a3af090d6e684af7ea2

                              SHA512

                              baf56d8e878ad5cf0d11a809e13d1106a5e71e8cf1195da03ae2c1677328c24187ef9b1642ab1d2413e59f0c7a82acd2b5e195e137d27f6b9cec61070af710e7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              a823ade983c4e5a82e69d84bdad979e8

                              SHA1

                              b54ade5d18f8ad368239df62b5e048d8a5a6f14b

                              SHA256

                              aa6e0649acd3309c3ded48917c2fc8e7d57c20889ad2a14d479aedbc5384fbac

                              SHA512

                              fbefa239978a8020701d4464f189be661f0d6e378afc7051376b07c9d168c71855c5e88fa247ddf9fbe3cd7a3f2ac21766f1667e098c35dfa5cd0bdf64a0c905

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              f0a3d13f3a4f39b5a20471a73f8acf97

                              SHA1

                              838bd1e327377aabfcf0fd24279fd7663797e9e5

                              SHA256

                              4f6f8d71b63116f2c9dbf29142d46855e4ad5d37bc8105523035a47a7f2db70e

                              SHA512

                              21ca19128bd3ee122d4928e295b3655c8b885a8a1c99f3b761872e92f1d0ee2294c74d6a364d743a478cf9f2055f0cfbcbb7edb295acf0721db215ba9ee61816

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              37c5f77a21ee38aea2831d26d4caec63

                              SHA1

                              b8ef2b08bc2f7013e4560e650c70d629aa6ab3f7

                              SHA256

                              238dc6f4b8bff6af5180640c26a521dd5fce33eb657a3716b4dda66ca0cc75e8

                              SHA512

                              5b26cca34e8068c93ae9147bc69ae3554b142eb0da1335421bbaba266f271b68f6080b7ce047e9b936063924918b0ff18e2ec39af5c33aa1a72afdce3cd677c9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              229KB

                              MD5

                              88163878397e8606743272d7a0163aea

                              SHA1

                              dabaca159ea0bcca92ff0441995ed5516e3218ee

                              SHA256

                              eda4b7ea0c619d3ca36a2399c0f286b9c2e71934bf309fa1d986c30aff952fa8

                              SHA512

                              cdcde87dcfbdc14ad3da2ce10de6ca9544bc2e140492d977470c832e5a12ddc72d09aafcd88a2ebbd63cb824ee4c00a0d0edcd403710adfb6805d7e6b1f9b2d4

                            • \??\pipe\crashpad_1640_MDEGUFJSRLORWSLB

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/5048-38-0x00007FFE0B010000-0x00007FFE0BAD1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5048-36-0x00007FFE0B013000-0x00007FFE0B015000-memory.dmp

                              Filesize

                              8KB

                            • memory/5048-0-0x00007FFE0B013000-0x00007FFE0B015000-memory.dmp

                              Filesize

                              8KB

                            • memory/5048-3-0x00007FFE0B010000-0x00007FFE0BAD1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5048-1-0x0000000000620000-0x0000000000638000-memory.dmp

                              Filesize

                              96KB