Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:06

General

  • Target

    631f9e498289dbc6c16e5dd35c516641016e0f0169bc422cb4f8114a78b25730.exe

  • Size

    63KB

  • MD5

    1636769fc06d9392049e48f3774517fe

  • SHA1

    1bd081c4546bf97630aba694500c449fd4d15b4b

  • SHA256

    631f9e498289dbc6c16e5dd35c516641016e0f0169bc422cb4f8114a78b25730

  • SHA512

    8f3c068ff1a5a4be901cad60517f9ada23905d4726435a575a259dd29e9f9b94d447f85933044600ef5afd9607e3fb980ca6d7c32c6237291dcd065ec615b08d

  • SSDEEP

    1536:PmImx6tX2kNff4sKu+UYFv0DQgb1APVmIcrPlTGBxK:Pm9x6tmkN7Ku+UYFfgb16mIcd6xK

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

*** 19 NOV ***

C2

19nov2024.duckdns.org:9003

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\631f9e498289dbc6c16e5dd35c516641016e0f0169bc422cb4f8114a78b25730.exe
    "C:\Users\Admin\AppData\Local\Temp\631f9e498289dbc6c16e5dd35c516641016e0f0169bc422cb4f8114a78b25730.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\xnzpsq.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\diskpart.exe
        diskpart disk 1
        3⤵
        • System Location Discovery: System Language Discovery
        PID:600
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ikbewr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1972
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ceqnsj.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1608
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\yihycs.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2324
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\uapimq.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\yinwlo.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown -r -t 8
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:2264
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
        PID:2800

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Cab9DC7.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar2928.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\ceqnsj.bat

        Filesize

        13B

        MD5

        40a43584ccccdaf0766634be67aeb09c

        SHA1

        f1393bf1d6eb71f8703918e19f65dd58c9580550

        SHA256

        84411e63e39fce42977374dd7dca3ff9a74605a5865f7dbc286bfb929af14759

        SHA512

        3f89ad072a9df464fec8e220c7d26a2cff8fb08fb9a267588396da7ddc8b6e5c2ddcf9262c0ebb6baa92a6dcf100ec10f3a469af2a1e2d29af9e17c3f50739c0

      • C:\Users\Admin\AppData\Local\Temp\ikbewr.bat

        Filesize

        6B

        MD5

        373d5cc730dd449760c437daf3d5a6d5

        SHA1

        cb97f9f662d25cf7b5092a30138f7a43fe80e803

        SHA256

        3aa78388a06d8af18054241b5f1370dab815d6344f6c70de2676b7f876cbabac

        SHA512

        afb44345f9872f947cd1c73a7a9db728944c4d47b0ca25eeb5e7e4e33a57d8467df762feff88a3902ba36a720aad09d41e33c6088360e0b099b4bf5ba0364fcd

      • C:\Users\Admin\AppData\Local\Temp\uapimq.bat

        Filesize

        13B

        MD5

        0b0be53db5b104e82c3bb71bd1cf4cfd

        SHA1

        4f14040cd261a4730bfd96c4ac95698a5b1cb7fc

        SHA256

        5474221ce9ad0e471a1b3fd9b806490f47f3a63618fc5641c4217c3094013b84

        SHA512

        f282f0a15cbbd84395534c13727873505f49313bceab751dbb8fd097e7a04b0e6959edf7d72bb10e765c51d5122f98812902169cb156bc2f682f0a32a95e82a5

      • C:\Users\Admin\AppData\Local\Temp\xnzpsq.bat

        Filesize

        23B

        MD5

        55356dbca07bafdf1047142bdb6723b2

        SHA1

        cdabcb68dae1d1ac7dab301a05d6d076d28ccb8c

        SHA256

        1913270e24d752035390649a518afe87943fa297107d742f2b4a4c443ca35285

        SHA512

        ba52c20120135634c80c39d63a41cceafcae6d53ef7de889492846f5200338038a93f7c9aeeaae85df1250776e3d7b51384661dbe584613cba69537ebe411473

      • C:\Users\Admin\AppData\Local\Temp\yihycs.bat

        Filesize

        17B

        MD5

        b65ffd49cc304920a12a088785bab529

        SHA1

        767647cd1fa4d8b633d00829e1b24dcf181076c2

        SHA256

        760d044760ec106676f4ac76f8cf50ae7e33fa482fced5c024e4f5598e2d2f09

        SHA512

        c6800a1da7d3010ca0e3ebf97bb7c03caf343e4d090f38dd35378115fa65da5896d7fda7987c34374dafcf18312f382624cf5a3070ac8e66e8251ea79df4efaa

      • C:\Users\Admin\AppData\Local\Temp\yinwlo.bat

        Filesize

        16B

        MD5

        c0f80d321aa72472fc0154cfd140005c

        SHA1

        6012d51e6035ef92e9f32179eae815459ee4ff5a

        SHA256

        76763b5fcc2a8c1ffdd1470aff31e19ebaa82592697a0dda4d92bdd2ecff1146

        SHA512

        2b7e54034f8e322ee9adaa317adea6a4d7062bf059dc3814f5ff990f43130ee09a178b8d402a4964c27dc1e19c97df0c42f4e9877bb9ad0357986822ad3075ab

      • memory/2316-22-0x0000000000550000-0x0000000000564000-memory.dmp

        Filesize

        80KB

      • memory/2316-20-0x0000000074910000-0x0000000074FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2316-41-0x0000000000940000-0x0000000000950000-memory.dmp

        Filesize

        64KB

      • memory/2316-0-0x000000007491E000-0x000000007491F000-memory.dmp

        Filesize

        4KB

      • memory/2316-19-0x000000007491E000-0x000000007491F000-memory.dmp

        Filesize

        4KB

      • memory/2316-2-0x0000000074910000-0x0000000074FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2316-1-0x0000000000EC0000-0x0000000000ED6000-memory.dmp

        Filesize

        88KB