Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2024, 19:42 UTC

General

  • Target

    002 COPIA DE LA NOTIFICACION.exe

  • Size

    966KB

  • MD5

    e634616d3b445fc1cd55ee79cf5326ea

  • SHA1

    ca27a368d87bc776884322ca996f3b24e20645f4

  • SHA256

    1fcd04fe1a3d519c7d585216b414cd947d16997d77d81a2892821f588c630937

  • SHA512

    7d491c0a97ce60e22238a1a3530f45fbb3c82377b400d7986db09eccad05c9c22fb5daa2b4781882f870ab088326e5f6156613124caa67b54601cbad8f66aa90

  • SSDEEP

    24576:we3xAibB85Z1HrWtB8z1L1OTJu5zzz3zzzozzz3zzzSZ:HxAibBEZ1LWtBzQrZ

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

envnuev1124.duckdns.org:3013

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
pNXpdbCkYFegXXVOPyI1T6ofUxYmKG1W

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\002 COPIA DE LA NOTIFICACION.exe
    "C:\Users\Admin\AppData\Local\Temp\002 COPIA DE LA NOTIFICACION.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:540

Network

  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    182.129.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    182.129.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    98.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    98.117.19.2.in-addr.arpa
    IN PTR
    Response
    98.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-98deploystaticakamaitechnologiescom
  • flag-us
    DNS
    envnuev1124.duckdns.org
    MSBuild.exe
    Remote address:
    8.8.8.8:53
    Request
    envnuev1124.duckdns.org
    IN A
    Response
    envnuev1124.duckdns.org
    IN A
    192.169.69.26
  • flag-us
    DNS
    26.69.169.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    26.69.169.192.in-addr.arpa
    IN PTR
    Response
    26.69.169.192.in-addr.arpa
    IN PTR
    sinkholehyascom
  • flag-us
    DNS
    22.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    envnuev1124.duckdns.org
    MSBuild.exe
    Remote address:
    8.8.8.8:53
    Request
    envnuev1124.duckdns.org
    IN A
    Response
    envnuev1124.duckdns.org
    IN A
    192.169.69.26
  • flag-us
    DNS
    envnuev1124.duckdns.org
    MSBuild.exe
    Remote address:
    8.8.8.8:53
    Request
    envnuev1124.duckdns.org
    IN A
    Response
    envnuev1124.duckdns.org
    IN A
    192.169.69.26
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 192.169.69.26:3013
    envnuev1124.duckdns.org
    tls
    MSBuild.exe
    233 B
    88 B
    3
    2
  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    182.129.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    182.129.81.91.in-addr.arpa

  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    98.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    98.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    envnuev1124.duckdns.org
    dns
    MSBuild.exe
    69 B
    85 B
    1
    1

    DNS Request

    envnuev1124.duckdns.org

    DNS Response

    192.169.69.26

  • 8.8.8.8:53
    26.69.169.192.in-addr.arpa
    dns
    72 B
    103 B
    1
    1

    DNS Request

    26.69.169.192.in-addr.arpa

  • 8.8.8.8:53
    22.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    22.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    31.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    envnuev1124.duckdns.org
    dns
    MSBuild.exe
    69 B
    85 B
    1
    1

    DNS Request

    envnuev1124.duckdns.org

    DNS Response

    192.169.69.26

  • 8.8.8.8:53
    envnuev1124.duckdns.org
    dns
    MSBuild.exe
    69 B
    85 B
    1
    1

    DNS Request

    envnuev1124.duckdns.org

    DNS Response

    192.169.69.26

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dede5fa8

    Filesize

    777KB

    MD5

    ba8172d9e2fd8b855d776832dd7a5ebd

    SHA1

    781e3d4326be977b0e5708ef89a43fc0ebdafb2f

    SHA256

    0103eb2e546e219a8a6662d1afdfc47b14ca32738b51d94af9ee9ac60a243826

    SHA512

    81bc3195e5d26e56c369f114f2bea8708520a08ff1402a3b215140d22b53e95b495e44005c5633f0cff4bf55a3315964fc599e32ec3a5b98881559c749745299

  • memory/540-27-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/540-26-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/540-25-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/540-24-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/540-23-0x0000000000700000-0x0000000000716000-memory.dmp

    Filesize

    88KB

  • memory/540-20-0x0000000073120000-0x0000000074374000-memory.dmp

    Filesize

    18.3MB

  • memory/2008-19-0x0000000074BA0000-0x0000000074D1B000-memory.dmp

    Filesize

    1.5MB

  • memory/2008-13-0x00007FFF0ED70000-0x00007FFF0EF65000-memory.dmp

    Filesize

    2.0MB

  • memory/2008-16-0x0000000074BAE000-0x0000000074BB0000-memory.dmp

    Filesize

    8KB

  • memory/2008-15-0x0000000074BA0000-0x0000000074D1B000-memory.dmp

    Filesize

    1.5MB

  • memory/2008-17-0x0000000074BA0000-0x0000000074D1B000-memory.dmp

    Filesize

    1.5MB

  • memory/4448-0-0x00007FFEF14D0000-0x00007FFEF1642000-memory.dmp

    Filesize

    1.4MB

  • memory/4448-10-0x00007FFF04A10000-0x00007FFF04A44000-memory.dmp

    Filesize

    208KB

  • memory/4448-11-0x00007FFEF1200000-0x00007FFEF14B5000-memory.dmp

    Filesize

    2.7MB

  • memory/4448-9-0x00007FF6CC680000-0x00007FF6CC778000-memory.dmp

    Filesize

    992KB

  • memory/4448-7-0x00007FFEF14D0000-0x00007FFEF1642000-memory.dmp

    Filesize

    1.4MB

  • memory/4448-6-0x00007FFEF14D0000-0x00007FFEF1642000-memory.dmp

    Filesize

    1.4MB

  • memory/4448-5-0x00007FFEF14E9000-0x00007FFEF14EA000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.