Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    03-12-2024 20:21

General

  • Target

    https://docs.google.com/uc?export=download&id=12kXZJJ2cqmd6tbJlUjUs-OiTE_3Lyqil

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

TDC

C2

noviembre07.ydns.eu:2525

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/uc?export=download&id=12kXZJJ2cqmd6tbJlUjUs-OiTE_3Lyqil
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdae85cc40,0x7ffdae85cc4c,0x7ffdae85cc58
      2⤵
        PID:2240
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1760 /prefetch:2
        2⤵
          PID:4224
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:3
          2⤵
            PID:2860
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2392 /prefetch:8
            2⤵
              PID:5100
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1
              2⤵
                PID:32
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                2⤵
                  PID:1964
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3664,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4676 /prefetch:8
                  2⤵
                    PID:2620
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4360,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4936 /prefetch:8
                    2⤵
                      PID:2300
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3764,i,7067351804310412857,15903789222911730013,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:8
                      2⤵
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1624
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:2996
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:3052
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4064
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024.tar"
                          1⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:3352
                          • C:\Users\Admin\AppData\Local\Temp\7zO81D4B018\2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024..exe
                            "C:\Users\Admin\AppData\Local\Temp\7zO81D4B018\2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024..exe"
                            2⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2148
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4160

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\3b64ed15-038e-4c19-90fb-d7c0944a35c3.tmp

                          Filesize

                          116KB

                          MD5

                          f30d1d2c66522045aab153b4d25bc1bb

                          SHA1

                          f5a1039aba55805aadedf1d530998345a3e3985e

                          SHA256

                          5aafcbd1e23a261e45f05443a902b5a23cfab2ebd935283557584f797d81bc49

                          SHA512

                          9447144c817156b6329c0cab4cb75f3d4261c438b5317e9d60c3b4aac865bc1f52c1eae229824546f68d510e6ba7de8ef362fa8b78d8c3e9b0e767b350aeb983

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\08ce1bce-6c44-43a1-ada1-3800387493a6.tmp

                          Filesize

                          9KB

                          MD5

                          a4fb623403227d859aba6b7a6064a309

                          SHA1

                          2125640676910ba19d672a2147fb42f3b2033984

                          SHA256

                          ec0d956f6b9e9096044c40fb904eaa424d3b1ec8e32c849dbe813f150fe02b13

                          SHA512

                          ab7c5b87e4ec2ea2a526a6e40611282dee04555653f784cecc76fb81ff2b6a9cb561d305782c1b7d37a9193f6909074b6431a91fc0ea113da6858afa5e82441e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\109c6bb8-089f-4532-83d9-b29ebd057b33.tmp

                          Filesize

                          9KB

                          MD5

                          b9a08afc07c608a36202fdd0e4e1a355

                          SHA1

                          49c994f822f30ba1218c824a7574d5c23b02cfb3

                          SHA256

                          650384783d4789eec6de8257c83f7514531b50ff2baa72a4066331d735b623ad

                          SHA512

                          25ec5d576745daaa9c69ab965c365dc21244aeb74f135180b3564b66cb7b1a9310414fbae1edb68377c71be38adcb3beba5c0a058461d53760c27b57047b6f2a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          014bee56a2cd1cd3f2e9d4e73a588171

                          SHA1

                          0c215155df568e0418cf5644a65c2cb3eac56a82

                          SHA256

                          13f4e10905d88dcfa55ae697db133e1dcf35ad8fdad2467a99d702b262b02bd4

                          SHA512

                          bc1599d2ef66bae70842d32c7fbf292402693de485337939dccafa483d9a4aa3ab6e8e53bb2d13450d9f8d716f3e30b2a4cc5aad1a9f860c46168488427de757

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          f145b045ce16b3a4cc8af2695fe60211

                          SHA1

                          bc284e803761c0143589debea1957b6d328594f0

                          SHA256

                          590ddfcd5f6e3954d70a3353c788f27d8e7130ed04e5b5a18f004b365442a9c3

                          SHA512

                          6f326ddea0857211dcdcc6f1c85412a1d2b887df8fde1846d2d2a55302336f0232953e5e56ddb9a72fb08f240d4c5a450bccfb509d75c1036afeb20acf3c93ac

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          524B

                          MD5

                          ba7b2369df7c74d2345408ce1a930c97

                          SHA1

                          6054f1d03b0946ea170975ccdb7a6b62da269959

                          SHA256

                          9616b9926a80cbf36fb33474fe8bca61f7b68790e61446278f33380b4a102a3f

                          SHA512

                          5c51f172078778ca79e908e5f5c73600af425f6cd7d74efde45319fd55ca2f3a272a5663c9446f4f59775d6d731753fdc82f29d88b16a6a0c04959a668d5cf61

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          4cca814645340276f57a600a5559581a

                          SHA1

                          3ff62c6fd42fac10620b60e276f30b5b23dbf082

                          SHA256

                          7bcf5b5fefa27778f3616694a9c67182dcdf2ac26db2bc62fa0738957f130a50

                          SHA512

                          8fdf6213b8dc469a2b2e4cd52a225d4e2dd8083adfa325ef0ba7b59c7d40af0bc0a8c8fd40119641d8f225fcc04302005751023a56d84e42c48e20c11e70fe77

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          a8e0805e888fc95be58cda1c9befa536

                          SHA1

                          50f139ec593785ce1e2bf5f8220482660dbbad84

                          SHA256

                          be28e3b9b90922b893d139633e820240898773d57ba92f35a7a861579dda790c

                          SHA512

                          51d4dee8a7cb57636048c92181fa0335c7df54876bca0892e2f2bb8395b8ba154d6494a88e3bbbdd8e42e0a0f1b06d5690d07dc7d06deafe81a703cdd90577b8

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          0e5a733d1fc8bd9415fe8e0a40cacddc

                          SHA1

                          48c84d56fa39390824d5de13f50d11b26c948a24

                          SHA256

                          3844995f43a1e40c896cdb49c99b7498011aac173ffd947da54e01c147d7ec08

                          SHA512

                          ff7da71a24185b5d2982aaaee9e87d51f06ddc3fb31bf7b3752e9eed3b188a5ee7ccb9cd0109306980ee31f81eb09d86517b10c65d09858b6f15deeee81fea85

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          2e5459ce81fdbcbcfe12e36ad43005fe

                          SHA1

                          e068a8dc89ff3fd5ec5cc747ad68d4d459e48294

                          SHA256

                          27c083fbf17711c04a7439349440eeaa4de2033f441fa20ab648ddc15c24a82f

                          SHA512

                          da7bb25da0dcf1191446c4fe19630277b74a7952b6229da8c3487f05126a84a258d56bcf5193ebbf8904c1bddf4c9c998c318ee8faa2504739c5197ef699f910

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          14dab29516582ab4ed810155ea8d7ba5

                          SHA1

                          89007e3e460d90a31d1cdf00678aa822bbc5dc43

                          SHA256

                          c04f5e6ff8e853d09a303f0947e2919a10ffba2389f1a9c116315be3b3ef82a8

                          SHA512

                          c2188edd728f1a67c53442f8083ef97842c94d70e8b62b17b36aa1f8278b836478c02a44447a8b65e6655bda4eca4356b7f0a4f39a4f01037e668d6cca8b702e

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          908bcbc53e42b95f7691f7cf95dcf582

                          SHA1

                          72f387ad1ec526f6500d8d95971c0b8f57127f5c

                          SHA256

                          06fb58ec3c87fab282cf5b7119db3ae9b6b26592225c6da23bd270de27efa501

                          SHA512

                          4ca8a02c1a746f69ed26520cc9226982f2ed78d1432eb5ea140a878606a20b6524184a4735f32776ac3b31d66142d6f0af5147922f0a2d7b4e6d881405c47fa4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          116KB

                          MD5

                          5cb563459785bc719928b64af2d7714f

                          SHA1

                          7e4635a5c8ca722d08aa8f407d2112992c704358

                          SHA256

                          58193becbeacf1b8f8e58b45b0eedd417ce2df1ca8af4836ffa2c774c68ffd03

                          SHA512

                          2158f23d223c114c0e9ecb27aa924c9e38f92004d63ac53413ed713b3737e1f700a353de71ae54f696d2604e7dc3620c902d0b8ff4b5d046d1323dff5beac97e

                        • C:\Users\Admin\AppData\Local\Temp\7zO81D4B018\2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024..exe

                          Filesize

                          1.1MB

                          MD5

                          db4e57ae7d70bec8d1d44632a28004bd

                          SHA1

                          a98a5ada1ce9d46e325f510b4736b77a031f0733

                          SHA256

                          26d5629e80aa0bd3d327b929693da12e11fd34415015d6b139f3f27ffd671bc1

                          SHA512

                          1f565cb1dc5e09fb074ba437aa7cf948d9c8cf5d8e7ba038a384efa500d02c959aa54d94101cbf15fd4f16a395d4d487ab2b3c8f9aea8740954ec00c3e4a5f6a

                        • C:\Users\Admin\Downloads\2057-SE INSTAURA PROCESO BAJO EL RADICADO No.1569322080-2024.tar

                          Filesize

                          476KB

                          MD5

                          9c31ac9353dff8b64e2e40c1b256023f

                          SHA1

                          d60e74bfcce783e8a0a34b7577e5d97c50269964

                          SHA256

                          a061d8998c92bbcb442f3f240f68e1a74bc75992353edcd78dabf2a173bde9a8

                          SHA512

                          aa4bc39fd732431cbb144bbb93ccb8e1a2cd1f0b68c64bb09f290407e67bbe35addab8cbb0688a69b8a836df29a4ea071c9d18144afebda63af855929214d918

                        • memory/2148-80-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2148-81-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2148-77-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2148-78-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2148-76-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2148-75-0x0000000000400000-0x0000000000526000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4160-82-0x00000000055C0000-0x00000000056C2000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4160-79-0x0000000000190000-0x00000000001A2000-memory.dmp

                          Filesize

                          72KB