Analysis

  • max time kernel
    257s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    23-10-2024 22:50

Errors

Reason
Machine shutdown

General

  • Target

    TF814BG.zip

  • Size

    8.6MB

  • MD5

    531993262de095bb38e55e9f317ef408

  • SHA1

    be17b17da93d42ff349a71c7a5de230aad37f2e0

  • SHA256

    8cac130cafde6f93de3f1b09de9c223d88da8a565de6755b03548a9f76bb5147

  • SHA512

    8648440226181b3bfb7f25feb6b30d4e93f1712ff27ec0f89ebedca818f9c2dbf9c5c8d8495ba38e0e6711276c54e046cd9e3a4fcd82e530a2def393555cae84

  • SSDEEP

    196608:Xmef1wvzRjnx/izRU91VqIhfmRF6CGMdkbKFcFXzClIg2SSqx1XmttX:b18Bnx/itGGzGMdW4Ig2p62ttX

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

envio122344.duckdns.org:3030

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 21 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\TF814BG.zip"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3436
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3084
    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\01 DEMANDA LABORAL.exe
      "C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\01 DEMANDA LABORAL.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          3⤵
          • Drops startup file
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 00
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\SysWOW64\shutdown.exe
              Shutdown /s /f /t 00
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2424
    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\01 DEMANDA LABORAL.exe
      "C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\01 DEMANDA LABORAL.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4796
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3860055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\313ec2d9

      Filesize

      777KB

      MD5

      6a4c32f0ccd6776c9ca7d5db0d20a3fa

      SHA1

      7c60ba0642f50deff4a68f591f11ee79324cba37

      SHA256

      545d37130893735d1dafff866cd888ddbe21b1772753fafbf0ee91f95e9abb44

      SHA512

      6ec94c7325dabbe381d1d763f8b036e4fb5094cdb8faa1acde4c1bf658ac43eb922235bb3f92667e48995e2273e9d1f81868aa49a63c872a37f09d5fc2a30e1d

    • C:\Users\Admin\AppData\Local\Temp\8484bcbc

      Filesize

      777KB

      MD5

      48bb5bfce9323a6905103df54f8bbc8a

      SHA1

      03cfd9a552cb2e5a06f17c0a81e49cfcf32a07a2

      SHA256

      2c5525c7de289c813b8b8c8343e4810c212f7ec22025aad8799ae799edcf9b95

      SHA512

      254853fd828bcce34fec2f02cc78d2453167b8d5089bbb3069218d8f9f7a082911d802af685e8cd89a3c4ef80728e30a7cbe4026cb08b6d2a40c173931c12cd8

    • C:\Users\Admin\AppData\Roaming\watcherupload\Qt5Core.dll

      Filesize

      5.8MB

      MD5

      8c6fb86cba9ecc09bcfa9f97b0ddd49a

      SHA1

      79e5d76b006c703dcadfe1ce68fd66530b71eac3

      SHA256

      ad78f3f77416cec0615aafe93fc4508aab0ec48358b2495859834b688f201bac

      SHA512

      c51a2b996e9145cf3413ccac7686568a822f2922d221f12a4c3cdb03253ecf463455aca7aa2aeb7eae22e002e235e113a4af0fcfd21c036847da45659d61bf00

    • C:\Users\Admin\AppData\Roaming\watcherupload\Qt5Network.dll

      Filesize

      1.3MB

      MD5

      6fd7ea116f695d6a8f0f4f2e0ee4af33

      SHA1

      aed6ea2255fab726e6087f6b33d047523676e252

      SHA256

      cdfd884492ebcbd3d8d78ea039881949d59c1051fa8771720a0950fb4d41ece1

      SHA512

      e88c48df6fb0c286a5dd1ff5246ceb6d1ffe66834c8bf1396e495247261af16527efcb84b97aa9a8830fdb5dc997f0b539cb1dda2de7559939323651de3c84b5

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\01 DEMANDA LABORAL.exe

      Filesize

      304KB

      MD5

      411cd1175b5e21b6a3c6a72c34e8773c

      SHA1

      faabd22ddca0062dd3d7bc534e49078ee5d84be8

      SHA256

      116b75d94dacf676931ff8623a0b34f3ea75b52d67b0494fefd1b8dce6bc121a

      SHA512

      6414d174a17edf813bb7f739b9d625c4489dd4a45c56932fad7f222a2b8ea646fd2316cdba4e421225cbdf4aeb245329aa5bb3034e2b54e3859dcd89c7d1dd90

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\Qt5Core.dll

      Filesize

      5.8MB

      MD5

      a69021f31874d4aefec8c3a2bedd4437

      SHA1

      aff85d5df7a4e69303f579b9a5a2ae82e14f3af6

      SHA256

      dc68a1446e829afa5c7e33f4dd2233e096a492bdf3a82eb0eeacfafb69bdecbf

      SHA512

      63fff0338d325f63431004f0fdf9e21a570536c1ac95ccd3f8a33c065d29d35d524ef6e2e5878d3986109e681480c03c2311b2447611003850d381bae4707667

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\Qt5Gui.dll

      Filesize

      6.2MB

      MD5

      34893cb3d9a2250f0edecd68aedb72c7

      SHA1

      37161412df2c1313a54749fe6f33e4dbf41d128a

      SHA256

      ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

      SHA512

      484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\Qt5Network.dll

      Filesize

      1.3MB

      MD5

      945cdfdd45ddd888d200d4aecf6fc67d

      SHA1

      10a4c05fbad2e753aee111a42a80fc6934c82b1c

      SHA256

      8e475e0ac9f67057944d2a11df81627d6d071eff16aa9425e53af58d1e06bcd2

      SHA512

      36439db83bee67f5d0edc00bc52f012cf8c47ec862bb07cbe47829812cd0cfdcf562945cea1474b878a0516d23530c13ef67a61a2fb9a9f099ee60007d3b5eee

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\Qt5PrintSupport.dll

      Filesize

      316KB

      MD5

      d0634933db2745397a603d5976bee8e7

      SHA1

      ddec98433bcfec1d9e38557d803bc73e1ff883b6

      SHA256

      7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

      SHA512

      9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\Qt5Widgets.dll

      Filesize

      5.3MB

      MD5

      c502bb8a4a7dc3724ab09292cd3c70d6

      SHA1

      ff44fddeec2d335ec0eaa861714b561f899675fd

      SHA256

      4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

      SHA512

      73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\hgrynm

      Filesize

      15KB

      MD5

      7d1d79f7d9c40c8731b2ed00617016b5

      SHA1

      44df1a866b1484d1c8d880890dc0d2619cfebfbe

      SHA256

      c6b33ff8f66931e068e8721ed8bad4cda5563aa40349cc70232b223d652c01f0

      SHA512

      fe3d15297010878d19927316847d1eb492ac5dc2845ad0872385347d8775dbc7f09adf8f4315ac68fb8e4f2f4bed92461c87f0dd04fc3d37fee031273fe57869

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\kvkrx

      Filesize

      535KB

      MD5

      b422eda01d139485f33c115ed8ba0226

      SHA1

      3310456e91115d7e24aad5b28566d692090b012b

      SHA256

      a6f8430667b16d30a31da995c34dc7ab01b346d874392060bd83a81e5fcbac21

      SHA512

      f775e385d5847f1b3375d9434a80c66fe5eade17f4579bbd0e1bc649927ee7b73b9152a2dea3d92ac324ebc68272c58aedeba8cdb57b849148e076258cb6c569

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\msvcp140.dll

      Filesize

      557KB

      MD5

      7db24201efea565d930b7ec3306f4308

      SHA1

      880c8034b1655597d0eebe056719a6f79b60e03c

      SHA256

      72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

      SHA512

      bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\vcruntime140.dll

      Filesize

      96KB

      MD5

      f12681a472b9dd04a812e16096514974

      SHA1

      6fd102eb3e0b0e6eef08118d71f28702d1a9067c

      SHA256

      d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

      SHA512

      7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

    • C:\Users\Admin\Desktop\00542-INICIO DEMANDA LABORAL JUZGADO 02 PENAL DE CIRCUITO DE RAMA JUDICIAL\vcruntime140_1.dll

      Filesize

      37KB

      MD5

      75e78e4bf561031d39f86143753400ff

      SHA1

      324c2a99e39f8992459495182677e91656a05206

      SHA256

      1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

      SHA512

      ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

    • memory/640-77-0x00007FFFE68C0000-0x00007FFFE6A32000-memory.dmp

      Filesize

      1.4MB

    • memory/640-101-0x00007FF7A0610000-0x00007FF7A068D000-memory.dmp

      Filesize

      500KB

    • memory/640-98-0x00007FFFE68C0000-0x00007FFFE6A32000-memory.dmp

      Filesize

      1.4MB

    • memory/640-76-0x00007FFFE6AD0000-0x00007FFFE701E000-memory.dmp

      Filesize

      5.3MB

    • memory/2748-115-0x0000000005460000-0x00000000054FC000-memory.dmp

      Filesize

      624KB

    • memory/2748-117-0x0000000005570000-0x00000000055D6000-memory.dmp

      Filesize

      408KB

    • memory/2748-127-0x0000000006630000-0x0000000006654000-memory.dmp

      Filesize

      144KB

    • memory/2748-125-0x0000000007530000-0x0000000007540000-memory.dmp

      Filesize

      64KB

    • memory/2748-124-0x0000000006B20000-0x0000000006B34000-memory.dmp

      Filesize

      80KB

    • memory/2748-123-0x0000000006D80000-0x0000000006E12000-memory.dmp

      Filesize

      584KB

    • memory/2748-122-0x0000000006A70000-0x0000000006A8E000-memory.dmp

      Filesize

      120KB

    • memory/2748-121-0x0000000000AD0000-0x0000000000AE4000-memory.dmp

      Filesize

      80KB

    • memory/2748-106-0x0000000073290000-0x00000000744E4000-memory.dmp

      Filesize

      18.3MB

    • memory/2748-109-0x0000000000960000-0x0000000000976000-memory.dmp

      Filesize

      88KB

    • memory/2748-120-0x0000000000DC0000-0x0000000000E36000-memory.dmp

      Filesize

      472KB

    • memory/2748-118-0x0000000006060000-0x0000000006162000-memory.dmp

      Filesize

      1.0MB

    • memory/2748-116-0x0000000005AB0000-0x0000000006054000-memory.dmp

      Filesize

      5.6MB

    • memory/3036-103-0x00007FF809670000-0x00007FF809865000-memory.dmp

      Filesize

      2.0MB

    • memory/3164-25-0x00007FF7A0610000-0x00007FF7A068D000-memory.dmp

      Filesize

      500KB

    • memory/3164-43-0x00007FFFE7FD0000-0x00007FFFE851E000-memory.dmp

      Filesize

      5.3MB

    • memory/3164-48-0x00007FFFE93F0000-0x00007FFFE9562000-memory.dmp

      Filesize

      1.4MB

    • memory/3164-59-0x00007FFFE93F0000-0x00007FFFE9562000-memory.dmp

      Filesize

      1.4MB

    • memory/3164-62-0x00007FF7A0610000-0x00007FF7A068D000-memory.dmp

      Filesize

      500KB

    • memory/4796-112-0x0000000073290000-0x00000000744E4000-memory.dmp

      Filesize

      18.3MB

    • memory/4820-104-0x0000000074D10000-0x0000000074E8B000-memory.dmp

      Filesize

      1.5MB

    • memory/4820-64-0x00007FF809670000-0x00007FF809865000-memory.dmp

      Filesize

      2.0MB