Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 21:52

General

  • Target

    11fbd295494309d56d775a11f805544737ce71d058a716194c0fd5b800cdc6d9.exe

  • Size

    501KB

  • MD5

    e619fff5751a713cf445da24a7a12c94

  • SHA1

    9fc67a572c69158541aaaab0264607ada70a408c

  • SHA256

    11fbd295494309d56d775a11f805544737ce71d058a716194c0fd5b800cdc6d9

  • SHA512

    07420c9a0336ae350567abf68d7f5ef52b34c4c010dbabae6693bf27fd5a50a8b2b16696a3bed7bdc846d542eb04ce6102d5387484f352f9d09c8789ccfcd9ae

  • SSDEEP

    12288:dFLn2Q1hI43dnpz9xDhrGooNUlN0HBcSBkAoJtMpbqrI118Lw3PTf:I43dpzvDhfoigC

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

212.15.49.155:4449

Mutex

zuvtbmtrjnwecuy

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11fbd295494309d56d775a11f805544737ce71d058a716194c0fd5b800cdc6d9.exe
    "C:\Users\Admin\AppData\Local\Temp\11fbd295494309d56d775a11f805544737ce71d058a716194c0fd5b800cdc6d9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    256KB

    MD5

    8d662564d514751028c65d96c696271f

    SHA1

    8e27943b7b901a808d39a7ee6977e1d3769a15fb

    SHA256

    86af5d6ee9d824ec2dfa73f44b9ae285d33e9748a8b6dbd4333d1ae06cf6f72b

    SHA512

    0a5460bbe7f43db560a08e508381613098a28de208a9d85c9c41fffa62b1e0299389a575dfa2b78767d3dd0fc73f0c88677ca32d7fe4e87698def1386cf35bef

  • memory/4312-19-0x0000000002440000-0x000000000244A000-memory.dmp

    Filesize

    40KB

  • memory/4312-1-0x00000000000C0000-0x0000000000146000-memory.dmp

    Filesize

    536KB

  • memory/4312-2-0x0000000002620000-0x0000000002626000-memory.dmp

    Filesize

    24KB

  • memory/4312-3-0x000000000A6F0000-0x000000000AC1C000-memory.dmp

    Filesize

    5.2MB

  • memory/4312-4-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/4312-21-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/4312-13-0x000000000B1D0000-0x000000000B774000-memory.dmp

    Filesize

    5.6MB

  • memory/4312-0-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/4312-12-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/4312-15-0x000000000A5E0000-0x000000000A672000-memory.dmp

    Filesize

    584KB

  • memory/5064-14-0x00000000004F0000-0x000000000051C000-memory.dmp

    Filesize

    176KB

  • memory/5064-18-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/5064-17-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/5064-11-0x00000000004F0000-0x000000000052B000-memory.dmp

    Filesize

    236KB

  • memory/5064-22-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/5064-23-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB