Analysis

  • max time kernel
    825s
  • max time network
    1047s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 23:18

General

  • Target

    BotKiller.exe

  • Size

    6KB

  • MD5

    10d199b2efdb69ed343f5cd4044b7def

  • SHA1

    1f218983db04d9b7b31a67aeead5a94ca5d3dc80

  • SHA256

    5fbd4e2c42e19e7ee561183ca6b2ded2f8049a890951704c799e8b4a016ab817

  • SHA512

    682feb271c12a847b69f1ac92ad7d5cad18b145b64af83dbe7fd0f6282be8bf6091323ca16bc509f789a68e74e17eb1484fce907f9a0562237b40572e0e8852c

  • SSDEEP

    96:1SJmM+BVOGjYKyhp+Aloz0yD/TB2uJW9wzNt:1smHOhpdXyLEuJIS

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

technical-southwest.gl.at.ply.gg:58694

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BotKiller.exe
    "C:\Users\Admin\AppData\Local\Temp\BotKiller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:2284
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:736
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:1220
          • C:\Windows\system32\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:4672
          • C:\Windows\system32\findstr.exe
            findstr All
            4⤵
              PID:4816
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3756
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:3924
              • C:\Windows\system32\netsh.exe
                netsh wlan show networks mode=bssid
                4⤵
                • Event Triggered Execution: Netsh Helper DLL
                PID:2276

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\376206f00732ea5b0a1b10e2cab412e2\Admin@KBKWGEBK_en-US\Browsers\Mozilla\Firefox\Bookmarks.txt

          Filesize

          105B

          MD5

          2e9d094dda5cdc3ce6519f75943a4ff4

          SHA1

          5d989b4ac8b699781681fe75ed9ef98191a5096c

          SHA256

          c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

          SHA512

          d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

        • C:\Users\Admin\AppData\Local\376206f00732ea5b0a1b10e2cab412e2\Admin@KBKWGEBK_en-US\System\Process.txt

          Filesize

          4KB

          MD5

          958b89c59997d635c5e6e108479726fa

          SHA1

          896adabde2dfff6ecb0fd10a91c654ca36a70443

          SHA256

          f6fd573db9b27dbe6224d92dfcae8097b096f9c869103c419906124f75ba6930

          SHA512

          c9cda9e2ca546a8ff44656779df62bf4eb482e9a58cd7415a2f6c62faa7ae2f5735cebea4ec61ff4d9823f74a6024208baef962381b649c35d647e31d59f50f4

        • C:\Users\Admin\AppData\Local\Temp\Loader.exe

          Filesize

          63KB

          MD5

          56c640c4191b4b95ba344032afd14e77

          SHA1

          c93a0fd32b46718ca3bc7d1c78ae6236b88ef3c9

          SHA256

          ebd4b1ab90350e2f13d46f2a356d5a637d5bec704cf3af211c43a89cb11dd142

          SHA512

          617512f96443b7cc9cc315d2eb0322d8b359218d459e80821563336b67ac263f1da9b00c75bde73320d6540572552c47b436c683c862f19b5ed470273001e63e

        • memory/2284-28-0x000000001CF80000-0x000000001D108000-memory.dmp

          Filesize

          1.5MB

        • memory/2284-25-0x00000000011E0000-0x0000000001256000-memory.dmp

          Filesize

          472KB

        • memory/2284-174-0x000000001BB90000-0x000000001BC0A000-memory.dmp

          Filesize

          488KB

        • memory/2284-17-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-18-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-19-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-22-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-23-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-24-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2284-15-0x0000000000770000-0x0000000000786000-memory.dmp

          Filesize

          88KB

        • memory/2284-26-0x0000000001160000-0x0000000001194000-memory.dmp

          Filesize

          208KB

        • memory/2284-27-0x00000000011B0000-0x00000000011CE000-memory.dmp

          Filesize

          120KB

        • memory/2284-33-0x0000000002970000-0x000000000297A000-memory.dmp

          Filesize

          40KB

        • memory/2808-0-0x000001A82BE00000-0x000001A82BE06000-memory.dmp

          Filesize

          24KB

        • memory/2808-2-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB

        • memory/2808-1-0x00007FFE6DBB3000-0x00007FFE6DBB5000-memory.dmp

          Filesize

          8KB

        • memory/2808-16-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

          Filesize

          10.8MB