Analysis

  • max time kernel
    972s
  • max time network
    989s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 18:18

General

  • Target

    Loader.exe

  • Size

    63KB

  • MD5

    56c640c4191b4b95ba344032afd14e77

  • SHA1

    c93a0fd32b46718ca3bc7d1c78ae6236b88ef3c9

  • SHA256

    ebd4b1ab90350e2f13d46f2a356d5a637d5bec704cf3af211c43a89cb11dd142

  • SHA512

    617512f96443b7cc9cc315d2eb0322d8b359218d459e80821563336b67ac263f1da9b00c75bde73320d6540572552c47b436c683c862f19b5ed470273001e63e

  • SSDEEP

    768:kvsM2sk/978SQC8A+XjivRIOdJD7P7DEhfW1+T4iSBGHmDbDOphLoX34/uSuwdph:v1/MED7jhBYUbghi3U5uwdpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

technical-southwest.gl.at.ply.gg:58694

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Checks computer location settings
    • Windows security modification
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3980
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1796
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1128
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1548
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add - MpPreference - ExclusionExtension ".exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    0e3b2fb1305afa355fb0585c068cdbbd

    SHA1

    b4e9457bfdc38337f64e3b2606aa34861aa6b4ed

    SHA256

    43a303fed06d5928800280cb0bf716790d9f886c87f26faf9fbdfa59b55e9c0d

    SHA512

    6a754dbb33c549ace5f71e169511422284f688c9df1c1e5fac8a633feac24312ba39fa4c682bdc9fe1d1162e2a3bd6190013652e567909417579db4b8791554d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    42cc9ff3509672894beabcd392a00c43

    SHA1

    c12dc74a6c8a8e1f8f4033d31495ebb09d70e9ab

    SHA256

    352d90b619218e7bf297219c1468e9ea487c9002e28984ec70a963088dff3579

    SHA512

    c876de012d1b237463b2c2a4195e050c2ddbdf5725aa2553313525ecb6a4a3f0cda9a289f257b886395da6407b5173451e95df89665ae1c727c6be3753a89271

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    92075279f2dbcaa5724ee5a47e49712f

    SHA1

    8dd3e2faa8432dde978946ebaf9054f7c6e0b2cb

    SHA256

    fd985ddd090621af25aa77aebff689c95ea7679ff0e81887124b2802ae3e9442

    SHA512

    744c62556233d9872f43ffb5a5a98aee20a44834436306f0a948c8c4072bdb46ef8044616593747edd645caaee60faf8b14fedb2d6df5f6019b5c73357d80d22

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    ce1bcf918960a60f96aa47ba48f3f859

    SHA1

    19162756fbc393f9a0f8740ab628ca459f90f578

    SHA256

    770e134e98ec4a964e22e23bdfb6bfacd295382c5d45fc1b90d6ed9b34307ef5

    SHA512

    d37419f97ad15e303f6d92924b49766e6995579e6c06e650df4016a930bdff44ecafb440b1263d34ac5217239c49b1ebfd709080b690f9b52a7bb2d7fcd666c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    15dde0683cd1ca19785d7262f554ba93

    SHA1

    d039c577e438546d10ac64837b05da480d06bf69

    SHA256

    d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

    SHA512

    57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    cc19bcff372d20459d3651ba8aef50e7

    SHA1

    3c6f1d4cdd647864fb97a16b1aefba67fcee11f7

    SHA256

    366473e774d8976c7fd4dc582220666fb61a4feb3f7c95e69b2a68ad9e446ec9

    SHA512

    a0e360ca4b6e874fd44612bf4b17f3722c0619da4f6bade12a62efadae88c2d33460114eaafa2bc3fb1cef5bea07e745b8bee24f15d0cacaff5f4a521b225080

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3n1jiooe.mtn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2176-40-0x000000001D0B0000-0x000000001D162000-memory.dmp

    Filesize

    712KB

  • memory/2176-3-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-11-0x000000001CEE0000-0x000000001CEFE000-memory.dmp

    Filesize

    120KB

  • memory/2176-85-0x000000001D590000-0x000000001D5C2000-memory.dmp

    Filesize

    200KB

  • memory/2176-9-0x000000001CF10000-0x000000001CF86000-memory.dmp

    Filesize

    472KB

  • memory/2176-1-0x0000000000320000-0x0000000000336000-memory.dmp

    Filesize

    88KB

  • memory/2176-2-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-10-0x000000001CE90000-0x000000001CEC4000-memory.dmp

    Filesize

    208KB

  • memory/2176-6-0x00007FFE6DBB3000-0x00007FFE6DBB5000-memory.dmp

    Filesize

    8KB

  • memory/2176-8-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-7-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/2176-0-0x00007FFE6DBB3000-0x00007FFE6DBB5000-memory.dmp

    Filesize

    8KB

  • memory/3980-27-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/3980-24-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/3980-23-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/3980-22-0x00007FFE6DBB0000-0x00007FFE6E671000-memory.dmp

    Filesize

    10.8MB

  • memory/3980-17-0x000001E28EC30000-0x000001E28EC52000-memory.dmp

    Filesize

    136KB