Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 15:29

General

  • Target

    file.exe

  • Size

    2.2MB

  • MD5

    1d3f1b333a438438193b1d29731fd607

  • SHA1

    0c8852028d925fc940ad1fcccc7539bf3c0db92c

  • SHA256

    ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f

  • SHA512

    b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d

  • SSDEEP

    49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:756
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe

      Filesize

      2.3MB

      MD5

      6686485b91f2f50fbdeb53b83acd3a87

      SHA1

      1fcf914c4e3711332b0a62308082645b4f8bfbb8

      SHA256

      605f8e4d0bc1f92c5bc9b0e37377c8e18226b1e2b4c61c0a0531ba865d66e43c

      SHA512

      588762f9d07ea4887b37f7a217d22ce9061449d17bdc7948d1fdb0139315d7d56c0cc30b28dafd2f33358d17e18ea452af5bb7fab6f99e8b7d7aabbbc3236924

    • memory/448-1201-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1202-0x0000000000900000-0x0000000000C04000-memory.dmp

      Filesize

      3.0MB

    • memory/448-1203-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1204-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1205-0x0000000005350000-0x000000000535A000-memory.dmp

      Filesize

      40KB

    • memory/448-1216-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1215-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1214-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1213-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1212-0x0000000006820000-0x0000000006B74000-memory.dmp

      Filesize

      3.3MB

    • memory/448-1211-0x00000000067F0000-0x0000000006812000-memory.dmp

      Filesize

      136KB

    • memory/448-1210-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/448-1209-0x0000000006060000-0x00000000060C6000-memory.dmp

      Filesize

      408KB

    • memory/448-1208-0x0000000006430000-0x00000000064CC000-memory.dmp

      Filesize

      624KB

    • memory/756-35-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-13-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-67-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-65-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-63-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-57-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-51-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-49-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-47-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-55-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-53-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-45-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-43-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-42-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-39-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-71-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-33-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-31-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-29-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-27-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-23-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-17-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-15-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-69-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-11-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-10-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-25-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-22-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-19-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-1186-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/756-1187-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/756-1188-0x0000000005840000-0x00000000059AE000-memory.dmp

      Filesize

      1.4MB

    • memory/756-1189-0x0000000005360000-0x00000000053AC000-memory.dmp

      Filesize

      304KB

    • memory/756-1190-0x000000007455E000-0x000000007455F000-memory.dmp

      Filesize

      4KB

    • memory/756-73-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-59-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-61-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-37-0x00000000053D0000-0x00000000055C9000-memory.dmp

      Filesize

      2.0MB

    • memory/756-9-0x00000000055D0000-0x0000000005662000-memory.dmp

      Filesize

      584KB

    • memory/756-8-0x0000000005B80000-0x0000000006124000-memory.dmp

      Filesize

      5.6MB

    • memory/756-7-0x00000000053D0000-0x00000000055CE000-memory.dmp

      Filesize

      2.0MB

    • memory/756-6-0x0000000000690000-0x00000000008F0000-memory.dmp

      Filesize

      2.4MB

    • memory/756-5-0x000000007455E000-0x000000007455F000-memory.dmp

      Filesize

      4KB

    • memory/756-1191-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/756-1192-0x0000000005760000-0x00000000057B4000-memory.dmp

      Filesize

      336KB

    • memory/756-1196-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/756-1199-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB

    • memory/756-1200-0x0000000074550000-0x0000000074D00000-memory.dmp

      Filesize

      7.7MB