General
-
Target
Network Experience.exe
-
Size
74KB
-
Sample
241109-p227psvcpk
-
MD5
a1e76f2fbe7af658b38383fbfd7cfff4
-
SHA1
6dc43ef73b59ff29089a4b29bc8ade4ea63484ec
-
SHA256
7782da3a91f91377c4c8d1d338237c6ff996ad42caaab27c1cdc5ea7e90058e1
-
SHA512
4a47391ba3132cfb36da8d7f08ae6856312b26547845e3fe5f3ddd0939893245bf4de337671bc917926d5c764a6100d084845236ef1707560ff5be4aa5f2bed8
-
SSDEEP
1536:rUa8cxqnHXC56PMVwKCpaIPr1bg/VkxLN+QzcoVVclN:rUrcxq3O6PMVQpLr1bg9kxQQJ3Y
Behavioral task
behavioral1
Sample
Network Experience.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Network Experience.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
proxy on top
gdfgvsdfdasfkjasdkjaske9831943ioqwkd
-
delay
1
-
install
true
-
install_file
NetworkEX.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/jGuGV3jT
Targets
-
-
Target
Network Experience.exe
-
Size
74KB
-
MD5
a1e76f2fbe7af658b38383fbfd7cfff4
-
SHA1
6dc43ef73b59ff29089a4b29bc8ade4ea63484ec
-
SHA256
7782da3a91f91377c4c8d1d338237c6ff996ad42caaab27c1cdc5ea7e90058e1
-
SHA512
4a47391ba3132cfb36da8d7f08ae6856312b26547845e3fe5f3ddd0939893245bf4de337671bc917926d5c764a6100d084845236ef1707560ff5be4aa5f2bed8
-
SSDEEP
1536:rUa8cxqnHXC56PMVwKCpaIPr1bg/VkxLN+QzcoVVclN:rUrcxq3O6PMVQpLr1bg9kxQQJ3Y
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1