Resubmissions

03-12-2024 08:17

241203-j6wb3asnfr 10

29-11-2024 00:44

241129-a3t56awqcx 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 08:17

General

  • Target

    58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe

  • Size

    372KB

  • MD5

    f9646131ff6c7b07e435791522b418b0

  • SHA1

    c0b1be54b2915cc9df1011836402e981a5815c92

  • SHA256

    58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210

  • SHA512

    44b54b19f35b3aca440eb09b8babdd3b22bc934145857b24a91b6fe65f1a6b2106a4a49266c55552135c63f8b8f85bc7a5e99d458cb277e2216ab2b20da089a5

  • SSDEEP

    3072:uD/0ZYthTLJRMB4IVGubl4m5plDzGuX7i2me4F8lpo6wB408ko/Z5hwy6q//kgrh:PYth1RiVGubCYfacu2tB3oB40zox4cf

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

178.215.224.142:4449

Mutex

ywldammnmlcvkfaatp

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

xworm7000.duckdns.org:7000

178.215.224.142:7000

Mutex

wDluQlkCVEcAclIo

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Vjw0rm family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 15 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe
    "C:\Users\Admin\AppData\Local\Temp\58cea87c2baf7227f19f5895064efcc7a410cc64f809648d79aabe4a1e7ea210N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe
      "C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\info.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:648
      • C:\Users\Admin\AppData\Local\Temp\Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Client.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3948
      • C:\Users\Admin\AppData\Local\Temp\XClient.exe
        "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3596
      • C:\Users\Admin\AppData\Local\Temp\0wazE.exe
        "C:\Users\Admin\AppData\Local\Temp\0wazE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4044
    • C:\Users\Admin\AppData\Local\Temp\0wazE.exe
      "C:\Users\Admin\AppData\Local\Temp\0wazE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0wazE.exe

    Filesize

    105KB

    MD5

    e264fe3d12c6e1a0f1d7e9ed2261e92d

    SHA1

    7a0e223c6ee4da81b80f49cbe6a602b2b354b1ab

    SHA256

    1a4bb157823139eff9b0bedce2a9452759ecc47801785743fb9667647347c4d5

    SHA512

    8a7ff7c1cf941aa10641650056f71da6974984c7383dade8683d7fd24e1ebd078da76dcc622238594fd53295205753c59364a64eaa67f3a2ea8734e679533209

  • C:\Users\Admin\AppData\Local\Temp\Client.exe

    Filesize

    74KB

    MD5

    0443ba1255e5419d79b3ed3382ec00ff

    SHA1

    f8dcda47375189f3164fc8419f84fa92674e4710

    SHA256

    9c238fa3c048bab6d3e72f171d2b3994ac1686477a4febdcb2fa7a8fa987c6f6

    SHA512

    d10064412a09576ffc9b5e2d22a0ca97a65f70f19e80c3494c2c9e422a36169e13ac72a9d948308d3aa3ccedb03998996611963de71eeca05a0607beaa199374

  • C:\Users\Admin\AppData\Local\Temp\Under Faxuler.exe

    Filesize

    687KB

    MD5

    7beac06d9c9dc95b8dacd72d6ea87597

    SHA1

    ccc9ef68f1781a7c5d2c9cc4ac57198698ec418e

    SHA256

    be0986c1154533a6fa8ae0eb77c0f6c95ff5a153dd096b408888816f71fef835

    SHA512

    04ff58b844a687aadb5f4243ef5431619b02036abb29768d77ca309039adb1505ff62853be6bae4c238e55a9645a916912d85445147652ff0cd7b3d35e80798f

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    38KB

    MD5

    789f782e9e3170fdbc5f69ad90f1fd54

    SHA1

    3e679929bc157c5a3f590ad15a9218c99fc2c1d3

    SHA256

    563760d0e6a3933465fe1021323e33d82e16f91a7cd71abd3afae862af2ad338

    SHA512

    5336464c17e4aa31b488f56025da479763c9292bd5fb354512d02c937c577494303fd0fee325ef25333f96839889f51bfbf4db0f98b42a22ee30613d96baf152

  • C:\Users\Admin\AppData\Local\Temp\info.js

    Filesize

    3KB

    MD5

    c9f85ebe8ae38f1bf04be9d4ebe82219

    SHA1

    c72eeed1d5814247196b0c9935f6fa86c010e4c6

    SHA256

    c0157ee7368a626b38657229ddd1e58d058e571fc83977c26a2f511c15197e37

    SHA512

    5ba0756ac069a4c1b5d6d1fe47a20916494bbbd076dbce05d7eae6f17330a350b00903e4f7ffdb8b98ad3aa96e7b66913bef3b0c4cfc43a8219aa93613948ae8

  • memory/1008-29-0x0000000000550000-0x0000000000570000-memory.dmp

    Filesize

    128KB

  • memory/1008-31-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1008-66-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1264-27-0x0000000002790000-0x00000000027D6000-memory.dmp

    Filesize

    280KB

  • memory/1264-28-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1264-25-0x0000000000550000-0x0000000000602000-memory.dmp

    Filesize

    712KB

  • memory/1264-63-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB

  • memory/3596-60-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3948-56-0x00000000002C0000-0x00000000002D8000-memory.dmp

    Filesize

    96KB

  • memory/4560-30-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4560-1-0x0000000000420000-0x0000000000482000-memory.dmp

    Filesize

    392KB

  • memory/4560-0-0x00007FF9CFC03000-0x00007FF9CFC05000-memory.dmp

    Filesize

    8KB

  • memory/4560-3-0x00007FF9CFC00000-0x00007FF9D06C1000-memory.dmp

    Filesize

    10.8MB