Analysis

  • max time kernel
    148s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 19:12

General

  • Target

    e88ccd1e7f73f9371fbc1347e0fca0cf902fff7c3cb0c9ea1a71714135af7096.exe

  • Size

    807KB

  • MD5

    4b8e7f6468b4a846bfef152f20ad625c

  • SHA1

    de6aba8a287228b428e40decb325c45fbe66c1ee

  • SHA256

    e88ccd1e7f73f9371fbc1347e0fca0cf902fff7c3cb0c9ea1a71714135af7096

  • SHA512

    3280848a0fc1bfb29a0ed5e1a913f04d463a8b06039e02b5c88230ab5717059e0f1cb974d0bdb86643595b0640c16dbcf14e10eaf44b0bd1204b9375f9a58f80

  • SSDEEP

    6144:iSncRl5sSeGlR9o1Re8XN6W8mmHPtppXPSi9b4fcSncRlrBoLp7ua9Q:P4IGlR9o1RrN6qatppXPm4RBYEa

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot7557878970:AAGK-77Z__cCdoMjeFBTGoWLVAg2XPHco-I/sendMessage?chat_id=8178371083

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88ccd1e7f73f9371fbc1347e0fca0cf902fff7c3cb0c9ea1a71714135af7096.exe
    "C:\Users\Admin\AppData\Local\Temp\e88ccd1e7f73f9371fbc1347e0fca0cf902fff7c3cb0c9ea1a71714135af7096.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\PROXYCHECKER-MASTERZ8.EXE
      "C:\Users\Admin\AppData\Local\Temp\PROXYCHECKER-MASTERZ8.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\SERVER BOT.EXE
      "C:\Users\Admin\AppData\Local\Temp\SERVER BOT.EXE"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3020
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3068
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:928
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1348
    • C:\Users\Admin\AppData\Local\Temp\TELEGRAM_ CONTACT @AMRNET1VIP1.MHTML.EXE
      "C:\Users\Admin\AppData\Local\Temp\TELEGRAM_ CONTACT @AMRNET1VIP1.MHTML.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\TELEGRAM_ CONTACT @AMRNET1VIP1.MHTML
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f5616d590b1862bdc2c97a1b7447868

    SHA1

    8b0742d5a892b7b4de6d577058ef449b8a818438

    SHA256

    5a9e600b4bc12adae0eee5fc26d36d0860b8acb6cb84adfc82ba0ade81210348

    SHA512

    42fd4234cc15222a539c2fe1532d13d6d4d14d5a038db12a451c7f9522183c849fff5863d87908d167cfdeb6658b23ecfc1acb129789761c31c74f1aa7b86236

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc795e469d463e1e04736f35c1fb9d26

    SHA1

    456c3b1a42ba7f4ec0f34faf62bff2608807b2e2

    SHA256

    7a3c8b3887ba5a7abd67f812f749209d900dbceeb661330eddb67ff519b79f09

    SHA512

    2c9e1c152d99326f5cae83cf161e89eb07672f360d6ce947b1b5fdad4f8aa22f3e0555b532d410c09e11537efca1812d5d21a304506d6497d181f0b859c1a669

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fb8a4616a811939d828bbc822e4d214

    SHA1

    3a252f99508696c6c9eb7abdf93d0cb5597937c3

    SHA256

    a32e4232455cb7fe06a147ca83cbc671cb45ded995bbea7ed0469647361844d8

    SHA512

    ebcf8e1dc2f2f723c289f879123c282c39879d1c7fb002cdeb162e94072bbcdeff101a6334f5a2cdd0aee273efbdf27332be2b58dcaf1648fc96af7392b8b6c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa42a0c068ae0528737356ab9e475460

    SHA1

    aa06ad1850971722dd2d9f6def727d65b85449e5

    SHA256

    7c14898d65757bbf012c50a3f48511979dbe79b5f1c4445cece2f74450d25850

    SHA512

    f5a5963cbc7edaf08dc42d11ec0981a745e5efaffa5be5522cedd4064b665b2bc9f6b9024f136d67150d1c70258c7f32ef6dc9fc16e7a739437972f968871faa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4a587d0a48ef207b171f807799b6a49

    SHA1

    8966939fab1e69919269a82bcf9c49a42fc8a348

    SHA256

    532600ec8bccff9de75b4cf981b42c1754f918949ee447454c89beef404c8506

    SHA512

    e238452b7a259fb6bc464cd1030874ff4f037ba59198c0406add1f26d9f80c078e1e2a5ea40e1c8f0692c1fe01935956fb2eb962c88ea5f7fac7fe9d8f22bf90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a80744ce2142a6a4a25ca1ae18f01842

    SHA1

    cdde8145d3f81204f3f099d9bceee8ebef1aa9e6

    SHA256

    bcabf827cf0f0b7168c1c5e933ff979885ce62dc6a26ac82f9270b62a6434b3f

    SHA512

    c034cc5d2dfa9691eaf3791060bc53f13ee7b7f2bc98e2d4ee77c3e1a359f108af2bf791bbd6a162b1b4c422e52f931815b982411b41a057bf5a0fb9817f9adf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c930b170e31cfaa98cac403200281296

    SHA1

    6de0deef3e821b3e58203f8f50d9179cc88e3957

    SHA256

    240771a9635b121de30573db19d4e84846c79ee8b4e11fc692b2ed1e4b972cf4

    SHA512

    c85bc96589b8092d00600f7e6f13fc53ca74759fcb3e835bedfe64ad76ba583acc26307b8d62fc2757fc63333fb5ec64fb69cd9dd5e94def704c971f93a8e19b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5aab8a38db0caf9f0a57a3c3174b1497

    SHA1

    7621674042eacf2df52db6268155a361cbeec444

    SHA256

    4b8de547fa2ff1ee4efaaded2ddb95eedca4b6550921ef9bb4f96b85f707fd13

    SHA512

    e3507e10164e4463020b9cc646f6ce5782ee15b54278661580fb2d77230f49f7c223ad8e3186cf7bb557839a8d6cc7588ab0039b0a83cc00aaf893e6a6268008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    108788e7356b0eaa96d84a53579140ce

    SHA1

    c719079819751557d7e9acab210f628783cac2df

    SHA256

    5192a6a8dc14ffcc9393088008990263c07b81793ad8208d13a6bd45d190dce5

    SHA512

    f24e3e8d3d15cd577f1d33010945cd5b2da4b8037145bafb340a35fbd555118a0d707c6ea6ed47c4948c39a82ec608aaeaa85a0372147882f42a73740b4b2038

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b05c1fb50e9288983835bbed1e5e24be

    SHA1

    380ae78ac456e5c1a744907304a96295db0596dd

    SHA256

    f9476c8ab7421746d61104d2d826e5fb6e9785d79a76f5abe0e115359779eeef

    SHA512

    7d6f1150841689680752fd2126df5b8d7776d73b869532241f67b6ff7e2da6fe16a418b18ab03bcc3c8644fbeabf1d7d5a1172f3f1d1727b0fda13eda47fa3f9

  • C:\Users\Admin\AppData\Local\63cc077a421cf2b870fcc7cfd7f12271\msgid.dat

    Filesize

    1B

    MD5

    cfcd208495d565ef66e7dff9f98764da

    SHA1

    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

    SHA256

    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

    SHA512

    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

  • C:\Users\Admin\AppData\Local\Temp\CabE967.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TELEGRAM_ CONTACT @AMRNET1VIP1.MHTML

    Filesize

    466KB

    MD5

    f9035161bd488986f5bac378372168cf

    SHA1

    7e6ceaffefb0529e72c1ded8c3b98230e85e2842

    SHA256

    17677889889bf300ebceb7b998ffef915ce1d7ae74ba106783afb569c8ec92d4

    SHA512

    cf1a25f5f728a4145e5f64c0f14f87beb5e6da8de8647330eb9322e9f4f15e0cb9b1f2d3aae72221e8359f747621d273f67755babf04dc8270122c273dd1da85

  • C:\Users\Admin\AppData\Local\Temp\TELEGRAM_ CONTACT @AMRNET1VIP1.MHTML.EXE

    Filesize

    519KB

    MD5

    7c908443c3e7c8713df4d3482adc6a89

    SHA1

    545145ded60fd817d329062b6df4e12818c530d3

    SHA256

    f06f72d8206e8476e7bf3261b18d19a6ddd7e02aed0b69cc932c261a9da2b620

    SHA512

    76d90435d08992ac4343f4b1cb01944f2713dc67691bb7038643fc8b05f73bed75515a4d1000a6e44ad2c2a37508af7128c4e50b8c3064e0786e84099903c951

  • C:\Users\Admin\AppData\Local\Temp\TarEA65.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\d07d8c794729ba403f10dda7a29708c9\Admin@BCXRJFKE_en-US\Browsers\Firefox\Bookmarks.txt

    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • \Users\Admin\AppData\Local\Temp\PROXYCHECKER-MASTERZ8.EXE

    Filesize

    65KB

    MD5

    047b902ab5e9a317eef11e6dcf4cfa8d

    SHA1

    e4212a9c195b85fd3409cd7dbba80dac9f66abfd

    SHA256

    e023315bebd54dbf73c6e2e92466edb8cc108e2c8b0658f3762d32447f6fd553

    SHA512

    900dcbe105b4b899afa9cfa92de0aa37bb05ad11fc425bb53ad6d3ed8dcebc9b6b67e2060fca78bddffb206c34fa5ebfe5fbf20996cfac0cc5aba7b1d5cf48fa

  • \Users\Admin\AppData\Local\Temp\SERVER BOT.EXE

    Filesize

    170KB

    MD5

    2e7cb0a4c91b31337f17742a2f73aaf7

    SHA1

    08b2db3956a4af5671d374f62e753fdbeeb94d36

    SHA256

    c92ccebe416798a16a22f1f45978df59988b4219d118eb9d2100fabe2eb78c3b

    SHA512

    7487c1f068a3edf4ae74f08a27fde66888703b3ee5883f88774e477c7b645eff1b6a950354f391239aca82a5cf0b9d28a1ad8adbac4159cfd92dc31fa34fbcb2

  • memory/2276-26-0x0000000000C70000-0x0000000000CA0000-memory.dmp

    Filesize

    192KB

  • memory/3000-27-0x0000000000590000-0x0000000000596000-memory.dmp

    Filesize

    24KB

  • memory/3000-25-0x0000000000040000-0x0000000000056000-memory.dmp

    Filesize

    88KB