Analysis

  • max time kernel
    126s
  • max time network
    92s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-12-2024 13:33

General

  • Target

    Bawless Cracked@Neural_Programmers.zip

  • Size

    13.5MB

  • MD5

    6555ada478f5009c224e953f030943ee

  • SHA1

    35719dca8ce05441e489d82f8d90debf7166ba11

  • SHA256

    35476eff95efc92ff88a5d35b8f58a46e04d4cba91746d78e6b7a206e44dd14c

  • SHA512

    bc5057d56fac9009f856a3718a243a57381e8ce2021640f96601170122b64eb0575ef8e070a0341aa6f2d5dad7f3fa93e12593c49afc9d839a6ecefa9ae5afc1

  • SSDEEP

    393216:+ylvkZPZo3MMqhaSGJ5UMQX7hAdHYWQvukalUcVotUu65:+K821dJiF7OdHYxmflDV465

Malware Config

Extracted

Family

asyncrat

Version

Bawless Remote

Botnet

V62OX

C2

127.0.0.1:15

Mutex

TXIZLGTBY

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Bawless Cracked@Neural_Programmers.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2924
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5064
    • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Bawless.exe
      "C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Bawless.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2952
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4496
      • C:\Users\Admin\Desktop\bawless-client.exe
        "C:\Users\Admin\Desktop\bawless-client.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2096

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\coaoaqka.newcfg

        Filesize

        563B

        MD5

        ac7c413d12070d7844af4270c7ccff79

        SHA1

        e6cb222e15928f5ee0e124c1a0aa0923eda17406

        SHA256

        fffa6fab7b68811e32d9cfb42dc97a570a66819b15c46eb2a7193e9d4ca66525

        SHA512

        1aa1629ac1b199e9952f993d7af3a8e5220448192fcdd4da031bac9b4a5cf928c0ab571b297f3a45f88a20ad3dd1388deb85877d1ca4278675f72c8341257faf

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        324B

        MD5

        6f97e818a92d10c37b9c4c555c715a00

        SHA1

        2dc3ae3bc516a2919f54f3dce03b7aa199c64fd4

        SHA256

        b8e09856c680a987752419330228705209205ddbb95d4a84f71c46bf07910227

        SHA512

        3f84bb9cb76aa82db36876b9b062c4984ff03309764f7de714486f15bb26ac8c122e82386a95f04d13e76d47fd81068ed397ed36451a3623b745ba9827ef5100

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        445B

        MD5

        24c57d122252fd5947ae1246d0708b8f

        SHA1

        c94d1b3cd70e7cd01dd7930259e97ed5930722c5

        SHA256

        a2c57ee96f7abdf0ec4913ed8ec7c66c42e1f22681f1473b6acc33652ca74d3e

        SHA512

        db6b07d96758307536a7d72fe898dadd834bf86d7bf5da4f2468f60c17003618773655a43f074389325f9c36fe12036689ac3c37c8fcf9787b341424977c78a3

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        443B

        MD5

        6575612aaeb120c5f342755adc529f6e

        SHA1

        8aef2db5faf03ca3bb4f6ec079ea034cd0aeaeb2

        SHA256

        7d32ea8b943db38548fdee583eeffb06e9b110e45d526c3624aab7bce28fc642

        SHA512

        c84d8eac67bca81e62934f6c773925620ca88f0bae426d032eeb7ccee26e9ce513ac3bb540c3b48dc09e3488f393316664a2a2d5df402f9bfe1b872d7dc4ed6b

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        444B

        MD5

        2da13a8ac6b0c9df84168c1e33aa4023

        SHA1

        69f425c19802df3ff261a555c271dfc4e9978a58

        SHA256

        4e1288f4484f07a4d26609992b1b8446b65ee93be8a96c3d99d1ca861abb47b9

        SHA512

        a5f56229a21a74a15937a340f39708847d7cf8424808e457f62ae179f6db7279d8ebd0f63fd47b258d905f6ae2a6855ad4f711c8f0e3b6a2a4b8daf51a962050

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        444B

        MD5

        c2d6b3a54dfe631572a9d9a9f7d2b32d

        SHA1

        95433b6d41bb67d214be0b9fdf94c618f145d7bf

        SHA256

        72bb48d857a108bea9de34dea606abd8c9b45d36bcd310a3e9766e4d1fa675b0

        SHA512

        995d399471141137ae984e4f6b3a0fe30936911a5908216671c4df7f8a8d3f897dd18e750880ea7261108218c7b8773b02014f86037e7b0137d35fec059676a8

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\user.config

        Filesize

        443B

        MD5

        e638c22bea6f9e94ff8a7fd911b116b3

        SHA1

        af544cf8769ddb610290010c01f7c242857ae558

        SHA256

        250571b222424f8f70bc7264b918d14705de15323bd2266286374735bd66a2c8

        SHA512

        715f68cfc2cf2aebb9be455598b1046389484d41d31c3f78f138ec33bfc9a6010b903db5c3eac8eb6d54a887eb7d2a571b396232efcca688d9ad834efe9d70f2

      • C:\Users\Admin\AppData\Local\KVTUeGqEzCfMMgCNfCLmJoBNI\Bawless.exe_Url_2pxddw0eacwxvdcuimm1ejnz0yrsznxj\1.0.0.0\yzxqcn34.newcfg

        Filesize

        444B

        MD5

        3b4f89eb097dacb0a980ec912e8aa0c0

        SHA1

        eb84ce9833a3a47d52d11bf9f88bee425ec44e3a

        SHA256

        ce60e7c94ee419b4d8d8e09c091cb0acdcce8c6eeb2e5462497ea90d6601e3f1

        SHA512

        3e4d59efb21f8f5c69b90b636dca29ce47fd71cb29bb334dc4c986a2eb366604473148241b6da910b0f39abb72e41b48cc28567da739fa8cf24418e42048928a

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Bawless.exe

        Filesize

        14.7MB

        MD5

        2fd36877f3c0f74cb98fdd041c06c5e2

        SHA1

        ae23f650cc5cdf50676a4e5f0f44fcd2acf769ae

        SHA256

        c39c732accfafc55f30d9e6cd8352731d66752886c054d75811b1581739b22cd

        SHA512

        b7389c539e9f360abab37dd62a2a6b019f19d8fc12cde9263e29b2f8143d59d9860e7a93a743d209e544a9535b901a54aa8720eb63324b33b729ec857973a5c7

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Bawless.exe.config

        Filesize

        3KB

        MD5

        ad12aef93fbca2090ed437d9fa01e9ea

        SHA1

        4ef2d37ce62bb3d4cd1b31b05993d119ac8b14fe

        SHA256

        8588e50544b7fa5d9c66ffaf6f56e2822886cc5d5d2415e755912f83e4457f38

        SHA512

        01ce371534f425cb756b423f33257feb21866b5672f3292f93ccbbff85a3cb0d63c3ddffde90860ac72d427bb0952075bdbffb85877b511316772ed2638b43ba

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        c1789e4cf0b77749e0bef8f984f9cd6d

        SHA1

        cdf9d3f1c45bf294380d59846ae26b9da8a65725

        SHA256

        d590f05dc6980e4681243e68bda05b7da7952d75d4aa34963c1535f79c8fc060

        SHA512

        e51e76476d5c46d467bbf92a25471e6525a8ea58a4cca7ee305b295b396cb53650169665979eac0ed9bebb38c74d62c03e2f3b29b70eb6eafaf9ba474fea33ca

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Plugins\ProcessManager.dll

        Filesize

        27KB

        MD5

        97a477186db32bb9020166069dbc25bc

        SHA1

        bb1eea629845e6adfcc8620eb80027c8ad145942

        SHA256

        e7d1a49c2c1ebce3b465f5a97d1771bd7681a263b676b0311a3ad9e58b87e1f9

        SHA512

        1e17734ff635b555888e686c5fa6bd8e86568bf45885c407bf2afbb96c95864781cd2274f99322df0d3683b5df504148f941dcc689e50d6b829db5a4f01e021e

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\ServerCertificate.p12

        Filesize

        1KB

        MD5

        bc287f55b62cf3ac94bfd74ca6cba679

        SHA1

        888da22e617f537ad3eafad44acc2e0e7c398de1

        SHA256

        e64da0484597a0a9547c4c9cc5047ead686fb783c35502c026ad91069fa8034d

        SHA512

        3e4e91132bcb66c75ebe9d28547b8847c90866af2dc0eb13a67cd8377d6d17fc5b740415f7ce43d43212f7e79ad21b2d52d530f4e3baaa1444d7d115b65763e6

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Stub\Client.exe

        Filesize

        63KB

        MD5

        6158c0682f86511060619bba0fe864be

        SHA1

        63a1738c87ba9449b1d572ee470da2b242742643

        SHA256

        5bf4fc2c4d3115229d60511cad1af48019a4c291ad6144e73393e88e319f80a5

        SHA512

        baef40b589d8717f419185ad0885173f790394827d72d78520890ae737c7ee1cebe3af062340847cfe705c223669562e7116f48ab11d59654653a0b269026bd1

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\Stub\Client.pdb

        Filesize

        59KB

        MD5

        008329249cc3e88aa1d6b89f409ccd13

        SHA1

        ab8a5d055e9aef140a19534c718f9b9ab2c379b9

        SHA256

        d5247c86c7402df8e64573e385ad7353f141dab59abc731fff3fe6a98a63e6b0

        SHA512

        36fbcc915dbcf19f0067e1089741abbb1910786fd0601cc8662b0b5fe985accf55f89d226004e15570949895363eba65f0d9a04bfa31764da36c5648e58b5c35

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\cGeoIp.dll

        Filesize

        2.3MB

        MD5

        6d6e172e7965d1250a4a6f8a0513aa9f

        SHA1

        b0fd4f64e837f48682874251c93258ee2cbcad2b

        SHA256

        d1ddd15e9c727a5ecf78d3918c17aee0512f5b181ad44952686beb89146e6bd0

        SHA512

        35daa38ad009599145aa241102bcd1f69b4caa55ebc5bb11df0a06567056c0ec5fcd02a33576c54c670755a6384e0229fd2f96622f12304dec58f79e1e834155

      • C:\Users\Admin\Desktop\Bawless Cracked@Neural_Programmers\dnlib.dll

        Filesize

        1.1MB

        MD5

        4d0b771879de85137ee7e5f0d4bb4b16

        SHA1

        fc32cccd0cd5c3ebd968bcdf48e32a7ea25e9bd7

        SHA256

        962332e8c8cb459fb2f7dacec5d7a618cc53b1b49bc1740156398c89742f43fd

        SHA512

        bae39862ea07ebc5c9aa07a7333a880471baf4bf52eebedc03536e45584887eecc1075e0c0171229a54900ab93a66db9f666aa631c160912f538666da8c9e980

      • C:\Users\Admin\Desktop\bawless-client.exe

        Filesize

        65KB

        MD5

        c28b08a4968ea683c6c4037f5b6873cf

        SHA1

        618d15b1840e7b8404f1807222e4f53a599349eb

        SHA256

        cef8b17bf71e7de07d10ac2856ff16996ca3c259b933952633ba52ee560831bf

        SHA512

        df6a6a852879a519513d381525ad5dcc183dde4a60c981929256bc272e9d63d8a5316a4f9d6a32848c98213d3ec4d079e6ecab62ecd272cf2d05ddfbd8dd14c9

      • memory/2096-285-0x0000000000BF0000-0x0000000000C06000-memory.dmp

        Filesize

        88KB

      • memory/2952-91-0x0000000009940000-0x000000000994A000-memory.dmp

        Filesize

        40KB

      • memory/2952-231-0x000000000B870000-0x000000000B8D6000-memory.dmp

        Filesize

        408KB

      • memory/2952-101-0x0000000074E20000-0x00000000755D1000-memory.dmp

        Filesize

        7.7MB

      • memory/2952-97-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

        Filesize

        4KB

      • memory/2952-96-0x000000000A350000-0x000000000A546000-memory.dmp

        Filesize

        2.0MB

      • memory/2952-261-0x0000000001AC0000-0x0000000001AC8000-memory.dmp

        Filesize

        32KB

      • memory/2952-92-0x0000000074E20000-0x00000000755D1000-memory.dmp

        Filesize

        7.7MB

      • memory/2952-259-0x0000000001770000-0x000000000178A000-memory.dmp

        Filesize

        104KB

      • memory/2952-90-0x0000000009960000-0x0000000009BB2000-memory.dmp

        Filesize

        2.3MB

      • memory/2952-258-0x000000000D410000-0x000000000D52E000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-86-0x0000000005C00000-0x0000000005C92000-memory.dmp

        Filesize

        584KB

      • memory/2952-85-0x00000000062A0000-0x0000000006846000-memory.dmp

        Filesize

        5.6MB

      • memory/2952-84-0x00000000002B0000-0x0000000001160000-memory.dmp

        Filesize

        14.7MB

      • memory/2952-83-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

        Filesize

        4KB