Analysis

  • max time kernel
    96s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 15:26

General

  • Target

    file.exe

  • Size

    2.2MB

  • MD5

    1d3f1b333a438438193b1d29731fd607

  • SHA1

    0c8852028d925fc940ad1fcccc7539bf3c0db92c

  • SHA256

    ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f

  • SHA512

    b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d

  • SSDEEP

    49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:408
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe

      Filesize

      2.3MB

      MD5

      6686485b91f2f50fbdeb53b83acd3a87

      SHA1

      1fcf914c4e3711332b0a62308082645b4f8bfbb8

      SHA256

      605f8e4d0bc1f92c5bc9b0e37377c8e18226b1e2b4c61c0a0531ba865d66e43c

      SHA512

      588762f9d07ea4887b37f7a217d22ce9061449d17bdc7948d1fdb0139315d7d56c0cc30b28dafd2f33358d17e18ea452af5bb7fab6f99e8b7d7aabbbc3236924

    • memory/408-5-0x000000007531E000-0x000000007531F000-memory.dmp

      Filesize

      4KB

    • memory/408-6-0x0000000000A80000-0x0000000000CE0000-memory.dmp

      Filesize

      2.4MB

    • memory/408-7-0x0000000005580000-0x000000000577E000-memory.dmp

      Filesize

      2.0MB

    • memory/408-8-0x0000000005D30000-0x00000000062D4000-memory.dmp

      Filesize

      5.6MB

    • memory/408-9-0x0000000005830000-0x00000000058C2000-memory.dmp

      Filesize

      584KB

    • memory/408-15-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-17-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-65-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-57-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-49-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-43-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-41-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-39-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-37-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-35-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-33-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-29-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-27-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-25-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-23-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-19-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-45-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-13-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-31-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-11-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-21-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-10-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-71-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-73-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-69-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-67-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-63-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-61-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-59-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-55-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-53-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-51-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-47-0x0000000005580000-0x0000000005779000-memory.dmp

      Filesize

      2.0MB

    • memory/408-1186-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1187-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1188-0x0000000005AF0000-0x0000000005C5E000-memory.dmp

      Filesize

      1.4MB

    • memory/408-1189-0x00000000058D0000-0x000000000591C000-memory.dmp

      Filesize

      304KB

    • memory/408-1190-0x000000007531E000-0x000000007531F000-memory.dmp

      Filesize

      4KB

    • memory/408-1191-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1192-0x0000000005A50000-0x0000000005AA4000-memory.dmp

      Filesize

      336KB

    • memory/408-1196-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1198-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1201-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/408-1200-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1202-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1203-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/4520-1204-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1205-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1206-0x0000000005810000-0x000000000581A000-memory.dmp

      Filesize

      40KB

    • memory/4520-1209-0x0000000006B60000-0x0000000006BFC000-memory.dmp

      Filesize

      624KB

    • memory/4520-1210-0x0000000006650000-0x00000000066B6000-memory.dmp

      Filesize

      408KB

    • memory/4520-1211-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1212-0x0000000006EF0000-0x0000000006F12000-memory.dmp

      Filesize

      136KB

    • memory/4520-1213-0x0000000006F20000-0x0000000007274000-memory.dmp

      Filesize

      3.3MB

    • memory/4520-1214-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1215-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1216-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4520-1217-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB