Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2024 17:40

General

  • Target

    Client.exe

  • Size

    48KB

  • MD5

    d9b8c518ec57c033af08d0bdb79066d6

  • SHA1

    a32af51564394ce258f8be78835d7a3d525a5a40

  • SHA256

    a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7

  • SHA512

    9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d

  • SSDEEP

    768:O9WBILLEZ9+RiEtelDSN+iV08YbygeWYb1ywPvevEgK/JIZVc6KN:O9cfEtKDs4zb1tYbIwPvenkJIZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:40721

127.0.0.1:50140

Binky812-40721.portmap.host:8848

Binky812-40721.portmap.host:40721

Binky812-40721.portmap.host:50140

hell4563o-50140.portmap.host:8848

hell4563o-50140.portmap.host:40721

hell4563o-50140.portmap.host:50140

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    MinecraftUpdater.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3184
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2260
      • C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe
        "C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb228646f8,0x7ffb22864708,0x7ffb22864718
      2⤵
        PID:1656
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2
        2⤵
          PID:4964
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:3
          2⤵
            PID:2584
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
            2⤵
              PID:1164
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
              2⤵
                PID:556
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                2⤵
                  PID:2420
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:1556
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:4140
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:4852
                    • C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe
                      "C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:4388

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      36988ca14952e1848e81a959880ea217

                      SHA1

                      a0482ef725657760502c2d1a5abe0bb37aebaadb

                      SHA256

                      d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                      SHA512

                      d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      fab8d8d865e33fe195732aa7dcb91c30

                      SHA1

                      2637e832f38acc70af3e511f5eba80fbd7461f2c

                      SHA256

                      1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                      SHA512

                      39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      e92ddcd2cbff80e62c19d7d3d176501c

                      SHA1

                      abb2d8d936d5968d51e192d54b89be887894c210

                      SHA256

                      17857fc1247a9fee2c060bdbc7cc2a08dfad8135bfc6e4089c533d596203c6e3

                      SHA512

                      22777f2e5a45f8cddaa68ea3a39957ef99672a29ca1f3166109c86196e389e81099b30a824655cffcbf645e157c94da81aaa3bcf2bb0be3ef56b9d6142648a49

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      4d69c50aa46b47de5f50f4be3bdb43de

                      SHA1

                      1bc9ce1a990ca7347a8b83512862714b0dffc4d0

                      SHA256

                      eb39ffe7821825ecf0051aefa5b0fa8af0b8074cfb9b58d0bc7554570d64d067

                      SHA512

                      f2302b934dd1f669938b60c3f0467f8a7b555971d4a3eb41c44271ed05d0d59b4408eaf0ba43dacf26a6dc7367d9c60d97cce2c237d42ede70ec746f475c90b3

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      10KB

                      MD5

                      a40cabfbae8a01bb3a2b3c41e69488f8

                      SHA1

                      dbc741e4e1bfdc0c10088d7190e63a305735d2a3

                      SHA256

                      3727092a14a0541e6b36f32a6d481a517ea24c9c5a55777084789e6dc00aae0e

                      SHA512

                      b704e5bd4d385d5483211691b3f67f5a19343d4672f0a38de2d4b54ea4e89db5e3e45f43cbc354492cdf2fcabafeb32aaea76fc0fb7fa89846a953c15400961c

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                      Filesize

                      264KB

                      MD5

                      f50f89a0a91564d0b8a211f8921aa7de

                      SHA1

                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                      SHA256

                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                      SHA512

                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                    • C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.bat

                      Filesize

                      160B

                      MD5

                      3db4c04ad90d9d617ce1c58b10b1455d

                      SHA1

                      7748686819249d902b0c11b2a612c4920c60312c

                      SHA256

                      d3c41b37de92624ecc666530aa9464d62315778722779969db1841816b00a592

                      SHA512

                      81493adec00775db6be4ffdae985abe86d08c2e52c091423c4819b0c8626bce09c9de8d5bb1cc0bef12defd7af7492613577a080cfe8add178fb1f29f6a291b8

                    • C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe

                      Filesize

                      48KB

                      MD5

                      d9b8c518ec57c033af08d0bdb79066d6

                      SHA1

                      a32af51564394ce258f8be78835d7a3d525a5a40

                      SHA256

                      a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7

                      SHA512

                      9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d

                    • memory/1168-7-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1168-2-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1168-1-0x00000000005B0000-0x00000000005C2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1168-0-0x00007FFB28113000-0x00007FFB28115000-memory.dmp

                      Filesize

                      8KB