Analysis

  • max time kernel
    128s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2024 21:23

Errors

Reason
Machine shutdown

General

  • Target

    NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15/00014 NotificacionElectronica.exe

  • Size

    168KB

  • MD5

    aef6452711538d9021f929a2a5f633cf

  • SHA1

    205b7fab75e77d1ff123991489462d39128e03f6

  • SHA256

    e611a1ffbe9e08a2660bc290a581aa0b54637524aaf6040a70e54f97136ce5ac

  • SHA512

    7ad84d4d3bab3f5a3e14f336d8931bf4b876299000081b2a94a3fcf698c56b82514753b483c5b8d7ae84ddd92ee1c4043fa5e7fb7c4f7e9eb52ca8c794e508b7

  • SSDEEP

    3072:+CNUaViEqjY1uimO3soWBgZNENeo0TzSCOtCUon/BA2gGaA44:dwEq7HO8ohEsxHSC+CUO/Bxk4

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

*** 14 NOV ***

C2

12novwins.duckdns.org:9003

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15\00014 NotificacionElectronica.exe
    "C:\Users\Admin\AppData\Local\Temp\NOTIFICACIÓN ELECTRÓNCIA JUDICIAL ESM AGRADECEMOS CONFIRMAR RECIBIDO 15\00014 NotificacionElectronica.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nwhgrr.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\SysWOW64\diskpart.exe
            diskpart disk 1
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4892
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dojbxz.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3128
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zptsqc.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3928
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ldukwe.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2492
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\whhezb.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:752
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\molpca.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Windows\SysWOW64\shutdown.exe
            shutdown -r -t 8
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1752
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:2180
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:2096
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3954055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\affef1b

      Filesize

      777KB

      MD5

      6d2f8d9ff5fd1687dbd97f60e85a30ca

      SHA1

      dda95f8a00a6e8035081d35d4ded3f89438f09d8

      SHA256

      2deb71ce03d8284df33f4ad8ee55d06ebb04cbaf6135d7d93d2c0c56edab5bf8

      SHA512

      164610b807aa25bd47409ccd965fada7f9e3bf7d2d3d816d62ba2ba4b03d8b165b1ebf24feec9659a3f1bb9722cc90d5188c8eeedfc759b86abd9ba64d425b16

    • C:\Users\Admin\AppData\Local\Temp\dojbxz.bat

      Filesize

      6B

      MD5

      373d5cc730dd449760c437daf3d5a6d5

      SHA1

      cb97f9f662d25cf7b5092a30138f7a43fe80e803

      SHA256

      3aa78388a06d8af18054241b5f1370dab815d6344f6c70de2676b7f876cbabac

      SHA512

      afb44345f9872f947cd1c73a7a9db728944c4d47b0ca25eeb5e7e4e33a57d8467df762feff88a3902ba36a720aad09d41e33c6088360e0b099b4bf5ba0364fcd

    • C:\Users\Admin\AppData\Local\Temp\ldukwe.bat

      Filesize

      17B

      MD5

      b65ffd49cc304920a12a088785bab529

      SHA1

      767647cd1fa4d8b633d00829e1b24dcf181076c2

      SHA256

      760d044760ec106676f4ac76f8cf50ae7e33fa482fced5c024e4f5598e2d2f09

      SHA512

      c6800a1da7d3010ca0e3ebf97bb7c03caf343e4d090f38dd35378115fa65da5896d7fda7987c34374dafcf18312f382624cf5a3070ac8e66e8251ea79df4efaa

    • C:\Users\Admin\AppData\Local\Temp\molpca.bat

      Filesize

      16B

      MD5

      c0f80d321aa72472fc0154cfd140005c

      SHA1

      6012d51e6035ef92e9f32179eae815459ee4ff5a

      SHA256

      76763b5fcc2a8c1ffdd1470aff31e19ebaa82592697a0dda4d92bdd2ecff1146

      SHA512

      2b7e54034f8e322ee9adaa317adea6a4d7062bf059dc3814f5ff990f43130ee09a178b8d402a4964c27dc1e19c97df0c42f4e9877bb9ad0357986822ad3075ab

    • C:\Users\Admin\AppData\Local\Temp\nwhgrr.bat

      Filesize

      23B

      MD5

      55356dbca07bafdf1047142bdb6723b2

      SHA1

      cdabcb68dae1d1ac7dab301a05d6d076d28ccb8c

      SHA256

      1913270e24d752035390649a518afe87943fa297107d742f2b4a4c443ca35285

      SHA512

      ba52c20120135634c80c39d63a41cceafcae6d53ef7de889492846f5200338038a93f7c9aeeaae85df1250776e3d7b51384661dbe584613cba69537ebe411473

    • C:\Users\Admin\AppData\Local\Temp\whhezb.bat

      Filesize

      13B

      MD5

      0b0be53db5b104e82c3bb71bd1cf4cfd

      SHA1

      4f14040cd261a4730bfd96c4ac95698a5b1cb7fc

      SHA256

      5474221ce9ad0e471a1b3fd9b806490f47f3a63618fc5641c4217c3094013b84

      SHA512

      f282f0a15cbbd84395534c13727873505f49313bceab751dbb8fd097e7a04b0e6959edf7d72bb10e765c51d5122f98812902169cb156bc2f682f0a32a95e82a5

    • C:\Users\Admin\AppData\Local\Temp\zptsqc.bat

      Filesize

      13B

      MD5

      40a43584ccccdaf0766634be67aeb09c

      SHA1

      f1393bf1d6eb71f8703918e19f65dd58c9580550

      SHA256

      84411e63e39fce42977374dd7dca3ff9a74605a5865f7dbc286bfb929af14759

      SHA512

      3f89ad072a9df464fec8e220c7d26a2cff8fb08fb9a267588396da7ddc8b6e5c2ddcf9262c0ebb6baa92a6dcf100ec10f3a469af2a1e2d29af9e17c3f50739c0

    • memory/400-29-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/400-22-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/400-24-0x00007FFF33470000-0x00007FFF33665000-memory.dmp

      Filesize

      2.0MB

    • memory/400-26-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/400-27-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/3544-20-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/3544-19-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/3544-18-0x0000000075103000-0x0000000075105000-memory.dmp

      Filesize

      8KB

    • memory/3544-5-0x00007FFF33470000-0x00007FFF33665000-memory.dmp

      Filesize

      2.0MB

    • memory/3544-2-0x0000000000AA0000-0x0000000000B71000-memory.dmp

      Filesize

      836KB

    • memory/3544-4-0x00000000750F0000-0x000000007526B000-memory.dmp

      Filesize

      1.5MB

    • memory/3544-0-0x0000000000A30000-0x0000000000A93000-memory.dmp

      Filesize

      396KB

    • memory/4652-35-0x0000000074CC0000-0x0000000075470000-memory.dmp

      Filesize

      7.7MB

    • memory/4652-41-0x0000000074CC0000-0x0000000075470000-memory.dmp

      Filesize

      7.7MB

    • memory/4652-42-0x0000000074CC0000-0x0000000075470000-memory.dmp

      Filesize

      7.7MB

    • memory/4652-43-0x0000000007110000-0x0000000007186000-memory.dmp

      Filesize

      472KB

    • memory/4652-44-0x0000000006080000-0x0000000006090000-memory.dmp

      Filesize

      64KB

    • memory/4652-45-0x00000000073F0000-0x000000000740E000-memory.dmp

      Filesize

      120KB

    • memory/4652-40-0x00000000060C0000-0x0000000006126000-memory.dmp

      Filesize

      408KB

    • memory/4652-39-0x0000000006600000-0x0000000006BA4000-memory.dmp

      Filesize

      5.6MB

    • memory/4652-38-0x0000000005FB0000-0x000000000604C000-memory.dmp

      Filesize

      624KB

    • memory/4652-34-0x0000000074CC0000-0x0000000075470000-memory.dmp

      Filesize

      7.7MB

    • memory/4652-33-0x0000000000DE0000-0x0000000000DF6000-memory.dmp

      Filesize

      88KB

    • memory/4652-30-0x0000000073580000-0x00000000747D4000-memory.dmp

      Filesize

      18.3MB

    • memory/4652-71-0x0000000074CC0000-0x0000000075470000-memory.dmp

      Filesize

      7.7MB