Analysis

  • max time kernel
    123s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 21:23

Errors

Reason
Machine shutdown

General

  • Target

    NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15/00014 NotificacionElectronica.exe

  • Size

    168KB

  • MD5

    aef6452711538d9021f929a2a5f633cf

  • SHA1

    205b7fab75e77d1ff123991489462d39128e03f6

  • SHA256

    e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac

  • SHA512

    7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7

  • SSDEEP

    3072:+CNUaViEqjY1uimO3soWBgZNENeo0TzSCOtCUon/BA2gGaA44:dwEq7HO8ohEsxHSC+CUO/Bxk4

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

*** 14 NOV ***

C2

12novwins.duckdns.org:9003

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15\00014 NotificacionElectronica.exe
    "C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15\00014 NotificacionElectronica.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tyhftt.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\SysWOW64\diskpart.exe
            diskpart disk 1
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2632
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\splnvy.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2112
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\ccapha.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\vmdlls.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2752
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\kldjhx.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1468
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\uxmadd.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:688
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -r -t 8
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:780
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1444
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
        PID:1464
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:2404
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:632

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\25783724

            Filesize

            777KB

            MD5

            58bda81f8d48a57b5e306d97bdc4ea23

            SHA1

            0dcf413219c8ef39308833cde71fa5aaaeb4bd1c

            SHA256

            10e5557ab4db72ef53dd3586bbaec5dc1b48314526a4f07eb29835ee175ae698

            SHA512

            c04cb6787e069561384fdfd3a4993dab1823600cc6be9e3dbf44bc41efa525387ce572bbf490e0de1f740082b240eb26dc5b9506c48195cfa6cbde34d5f3b956

          • C:\Users\Admin\AppData\Local\Temp\Cab25AC.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarCFE2.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\ccapha.bat

            Filesize

            13B

            MD5

            40a43584ccccdaf0766634be67aeb09c

            SHA1

            f1393bf1d6eb71f8703918e19f65dd58c9580550

            SHA256

            84411e63e39fce42977374dd7dca3ff9a74605a5865f7dbc286bfb929af14759

            SHA512

            3f89ad072a9df464fec8e220c7d26a2cff8fb08fb9a267588396da7ddc8b6e5c2ddcf9262c0ebb6baa92a6dcf100ec10f3a469af2a1e2d29af9e17c3f50739c0

          • C:\Users\Admin\AppData\Local\Temp\kldjhx.bat

            Filesize

            13B

            MD5

            0b0be53db5b104e82c3bb71bd1cf4cfd

            SHA1

            4f14040cd261a4730bfd96c4ac95698a5b1cb7fc

            SHA256

            5474221ce9ad0e471a1b3fd9b806490f47f3a63618fc5641c4217c3094013b84

            SHA512

            f282f0a15cbbd84395534c13727873505f49313bceab751dbb8fd097e7a04b0e6959edf7d72bb10e765c51d5122f98812902169cb156bc2f682f0a32a95e82a5

          • C:\Users\Admin\AppData\Local\Temp\splnvy.bat

            Filesize

            6B

            MD5

            373d5cc730dd449760c437daf3d5a6d5

            SHA1

            cb97f9f662d25cf7b5092a30138f7a43fe80e803

            SHA256

            3aa78388a06d8af18054241b5f1370dab815d6344f6c70de2676b7f876cbabac

            SHA512

            afb44345f9872f947cd1c73a7a9db728944c4d47b0ca25eeb5e7e4e33a57d8467df762feff88a3902ba36a720aad09d41e33c6088360e0b099b4bf5ba0364fcd

          • C:\Users\Admin\AppData\Local\Temp\tyhftt.bat

            Filesize

            23B

            MD5

            55356dbca07bafdf1047142bdb6723b2

            SHA1

            cdabcb68dae1d1ac7dab301a05d6d076d28ccb8c

            SHA256

            1913270e24d752035390649a518afe87943fa297107d742f2b4a4c443ca35285

            SHA512

            ba52c20120135634c80c39d63a41cceafcae6d53ef7de889492846f5200338038a93f7c9aeeaae85df1250776e3d7b51384661dbe584613cba69537ebe411473

          • C:\Users\Admin\AppData\Local\Temp\uxmadd.bat

            Filesize

            16B

            MD5

            c0f80d321aa72472fc0154cfd140005c

            SHA1

            6012d51e6035ef92e9f32179eae815459ee4ff5a

            SHA256

            76763b5fcc2a8c1ffdd1470aff31e19ebaa82592697a0dda4d92bdd2ecff1146

            SHA512

            2b7e54034f8e322ee9adaa317adea6a4d7062bf059dc3814f5ff990f43130ee09a178b8d402a4964c27dc1e19c97df0c42f4e9877bb9ad0357986822ad3075ab

          • C:\Users\Admin\AppData\Local\Temp\vmdlls.bat

            Filesize

            17B

            MD5

            b65ffd49cc304920a12a088785bab529

            SHA1

            767647cd1fa4d8b633d00829e1b24dcf181076c2

            SHA256

            760d044760ec106676f4ac76f8cf50ae7e33fa482fced5c024e4f5598e2d2f09

            SHA512

            c6800a1da7d3010ca0e3ebf97bb7c03caf343e4d090f38dd35378115fa65da5896d7fda7987c34374dafcf18312f382624cf5a3070ac8e66e8251ea79df4efaa

          • memory/2332-72-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/2332-89-0x0000000000490000-0x00000000004A0000-memory.dmp

            Filesize

            64KB

          • memory/2332-70-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2332-71-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2332-68-0x0000000073160000-0x00000000741C2000-memory.dmp

            Filesize

            16.4MB

          • memory/2868-18-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/2868-20-0x0000000077B30000-0x0000000077CD9000-memory.dmp

            Filesize

            1.7MB

          • memory/2868-69-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/2868-66-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/2868-65-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/3032-16-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/3032-0-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/3032-15-0x0000000074FA0000-0x0000000075114000-memory.dmp

            Filesize

            1.5MB

          • memory/3032-14-0x0000000074FB3000-0x0000000074FB5000-memory.dmp

            Filesize

            8KB

          • memory/3032-1-0x0000000077B30000-0x0000000077CD9000-memory.dmp

            Filesize

            1.7MB