Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-11-2024 16:09

General

  • Target

    DOCUMENTOS DETALLADOS PARA PROCESO LEGAL, ANEXOS 7342987363478021871266893470921468042370924147246083.exe

  • Size

    1.1MB

  • MD5

    37808034c4c48ae4fd516daf4ad7f61d

  • SHA1

    073a64ea526ed87d26c265a14f06a9ca62e120df

  • SHA256

    c5861e298e0352018b982c381bc63dc0248bb45c939fe91eb69d72e5469a2460

  • SHA512

    a29b42d7e40505d42e0f6d747ced4db0efd8308b0975cb6710867c0317742f3abcc4aa6f1cf41f9a3a84ba633a2c8221119b7ea44fefa330f9727b3091313f54

  • SSDEEP

    24576:IBFtxUtMhFfz2VzZqhCwHIGgRstvkw/sCcwCsyB:CdFfz2MCAIGgRshkcC

Malware Config

Extracted

Family

asyncrat

Version

0.5.7A

Botnet

COMISARIA

C2

comisaria11.duckdns.org:6606

Mutex

uuooxuxbnkywum

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DETALLADOS PARA PROCESO LEGAL, ANEXOS 7342987363478021871266893470921468042370924147246083.exe
    "C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DETALLADOS PARA PROCESO LEGAL, ANEXOS 7342987363478021871266893470921468042370924147246083.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4408-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

    Filesize

    4KB

  • memory/4408-1-0x00000000004B0000-0x00000000005CA000-memory.dmp

    Filesize

    1.1MB

  • memory/4408-2-0x0000000005560000-0x000000000564C000-memory.dmp

    Filesize

    944KB

  • memory/4408-3-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/4408-4-0x0000000005D40000-0x00000000062E6000-memory.dmp

    Filesize

    5.6MB

  • memory/4408-5-0x0000000005890000-0x0000000005922000-memory.dmp

    Filesize

    584KB

  • memory/4408-33-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-37-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-63-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-69-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-67-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-65-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-61-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-59-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-58-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-55-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-53-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-52-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-49-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-47-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-46-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-41-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-39-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-43-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-35-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-31-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-30-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-27-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-25-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-24-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-21-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-19-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-17-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-15-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-13-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-11-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-9-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-7-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-6-0x0000000005560000-0x0000000005646000-memory.dmp

    Filesize

    920KB

  • memory/4408-1156-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/4408-1157-0x0000000005930000-0x000000000598C000-memory.dmp

    Filesize

    368KB

  • memory/4408-1158-0x00000000054A0000-0x00000000054EC000-memory.dmp

    Filesize

    304KB

  • memory/4408-1159-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

    Filesize

    4KB

  • memory/4408-1160-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/4408-1161-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/4408-1162-0x00000000059F0000-0x0000000005A44000-memory.dmp

    Filesize

    336KB

  • memory/4408-1167-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-1166-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/5048-1168-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-1169-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-1172-0x0000000005480000-0x000000000551C000-memory.dmp

    Filesize

    624KB

  • memory/5048-1173-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/5048-1174-0x0000000074DF0000-0x00000000755A1000-memory.dmp

    Filesize

    7.7MB