Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 02:42

General

  • Target

    ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f.exe

  • Size

    2.2MB

  • MD5

    1d3f1b333a438438193b1d29731fd607

  • SHA1

    0c8852028d925fc940ad1fcccc7539bf3c0db92c

  • SHA256

    ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f

  • SHA512

    b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d

  • SSDEEP

    49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f.exe
        "C:\Users\Admin\AppData\Local\Temp\ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4660
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe

      Filesize

      2.3MB

      MD5

      6686485b91f2f50fbdeb53b83acd3a87

      SHA1

      1fcf914c4e3711332b0a62308082645b4f8bfbb8

      SHA256

      605f8e4d0bc1f92c5bc9b0e37377c8e18226b1e2b4c61c0a0531ba865d66e43c

      SHA512

      588762f9d07ea4887b37f7a217d22ce9061449d17bdc7948d1fdb0139315d7d56c0cc30b28dafd2f33358d17e18ea452af5bb7fab6f99e8b7d7aabbbc3236924

    • memory/1788-1203-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1788-1204-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/1788-1205-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1788-1206-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1788-1207-0x00000000056A0000-0x00000000056AA000-memory.dmp

      Filesize

      40KB

    • memory/1788-1209-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/1788-1208-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-67-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-57-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-9-0x0000000005900000-0x0000000005992000-memory.dmp

      Filesize

      584KB

    • memory/4660-21-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-19-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-13-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-11-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-37-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-31-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-30-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-27-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-25-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-23-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-17-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-15-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-10-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-51-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-73-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-71-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-69-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-7-0x0000000005640000-0x000000000583E000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-65-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-63-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-61-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-59-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-8-0x0000000005DF0000-0x0000000006394000-memory.dmp

      Filesize

      5.6MB

    • memory/4660-53-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-49-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-47-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-45-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-43-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-41-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-39-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-35-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-33-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-55-0x0000000005640000-0x0000000005839000-memory.dmp

      Filesize

      2.0MB

    • memory/4660-1186-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1187-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1188-0x0000000005BC0000-0x0000000005D2E000-memory.dmp

      Filesize

      1.4MB

    • memory/4660-1189-0x00000000059A0000-0x00000000059EC000-memory.dmp

      Filesize

      304KB

    • memory/4660-1190-0x000000007466E000-0x000000007466F000-memory.dmp

      Filesize

      4KB

    • memory/4660-1191-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1192-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-6-0x0000000000A10000-0x0000000000C70000-memory.dmp

      Filesize

      2.4MB

    • memory/4660-5-0x000000007466E000-0x000000007466F000-memory.dmp

      Filesize

      4KB

    • memory/4660-1193-0x0000000005B20000-0x0000000005B74000-memory.dmp

      Filesize

      336KB

    • memory/4660-1198-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1201-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1199-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB

    • memory/4660-1202-0x0000000074660000-0x0000000074E10000-memory.dmp

      Filesize

      7.7MB