Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 19:41

General

  • Target

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe

  • Size

    12.7MB

  • MD5

    2c5d99dfc22e3c7c13abd40ef29082a6

  • SHA1

    2eae7f57966c4409cfecda611ddb41e3d1da8147

  • SHA256

    521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec

  • SHA512

    21af954bb927cd6548f20333b582c130fa3e4f6a253318b3aec66fe8628dbe50a7ecdc729935f5a215a3ac2027429d87a58fea9a0f2b93e5c477cc5a3fd037fc

  • SSDEEP

    196608:fmQDIJzN0rl/RNfrOzDzRgIurg8dCMZqWlggN2:eQO0rl/RRSgIurgjyGgN2

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Neshta payload 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe
    "C:\Users\Admin\AppData\Local\Temp\521e56bdd27018ee0f40341bf556f7748f2eebb32a4bd016789a6b7801d010ec.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe
      "C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 568
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:528
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2336
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Czvmmniarhsx.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1808
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1976
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Fiswjsizjcjynjqomep.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2308
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Help.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        PID:1924
        • C:\Windows\SysWOW64\help.exe
          "C:\Windows\System32\help.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1696
    • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe
      "C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 15
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:524
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1572
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1192
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:824
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2420
      • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows Security Services" Update.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DangerousRAT.exe

    Filesize

    11.2MB

    MD5

    fb40ba1b494af4057ab259bba5f33fe6

    SHA1

    b872393a07d3949947a41871132b736c00c771bb

    SHA256

    40a82c50b9875698551a2f6dd4f71fc23b4a04eeec655a4746111279ef57d2ac

    SHA512

    f2feec8be6578aa273efd363ae1eba0862fc240a441fd8d1f14942fda241e34896e7b76179d7132af97f18acdf13afd4032f1874a9b20cc04120706beff9e804

  • C:\Users\Admin\AppData\Local\Temp\Pblsxziib.vbs

    Filesize

    117B

    MD5

    a2bde8651257c1619a01520a092e3871

    SHA1

    0b56111496c724038b00222639658856962c7ab7

    SHA256

    ff5ad6b32f7c48563c4c2686cdd55b5005e729da4b932dc0e7689aa7c182e0df

    SHA512

    dbf9c9141c1d2df2905b8ad8169e33e7d8328dfd7f19119163601b5f7a06b380f7836fe0d276929d0fb40e29337a28f5ae6b1a8bcd115e10dac03ec3317e525b

  • C:\Users\Admin\AppData\Local\Temp\Rtlieujwqeasnagwindows update.vbs

    Filesize

    614KB

    MD5

    b14587cd6b30dea73f73d6138ea9d259

    SHA1

    e289a674f9b1138c1b8f392ec752c912800be0cc

    SHA256

    f5359df2aaa02fbfae540934f3e8f8a2ab362f7ee92dda536846afb67cea1b02

    SHA512

    5ac61b9eb9fbdca73e6ecfdb59e199419de0feb57f77652d8fbfebd543450fde593d375f76b5eb9a9bcd6f6c1dd01298dc1dc55f8e9844333b94ac49a3755f86

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Help.exe

    Filesize

    518KB

    MD5

    8a20ca605ca1ce7803ffb9e2219d5206

    SHA1

    88f2d6daf773b62d7913acce676b72b0818c2e08

    SHA256

    2c8aa2ce1b5b818d7a66f24cbb30d664d5618af94248ebf9c55e713c1f97d162

    SHA512

    0e4abf37ed5b528712662bf03bd4afb384fba9448d51a26cce03cb68cce4e018f5b295bea7b137146814fbe891e46348034e07c36b6ad47faf18b79ad198b348

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Services Update.exe

    Filesize

    489KB

    MD5

    7e805a295cc926c83de5913878219200

    SHA1

    ade9551bcaf138334054c6d16ae928bd107144a3

    SHA256

    afadf913b2d2a4caacc2b893c049b75766596efb4adfedbf217f618d4e4a8eb5

    SHA512

    18115735c618c5d44f1ebdfd2e8d455bc0f611481f3a652510abeca1b3c4829c4189aebe9d570359ab0b1b13574727ae3641db66080e43cb9a6b281bfcc6634f

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Services.exe

    Filesize

    468KB

    MD5

    b0a2c3ad7d88f8928f7e1fce28223228

    SHA1

    2d53080eedf02ebc1c87f33b2bf51e60071863e0

    SHA256

    4693e7ec8479b765e57bf6dc2b2eb11ddd3523fe4cf76a3fd3c8d449fd17953f

    SHA512

    b9eed874f4fb9b903fac4f9f150e6bf4e7a79e62e5174ce4082600a402626a17cac74730028fd0ace092a76b94d2197518dcd05d8d3ad52330cfabc3195ae95a

  • C:\Users\Admin\AppData\Local\Temp\_Pblsxziib.vbs

    Filesize

    181B

    MD5

    f1502081d1172131e3d33d384d1adb56

    SHA1

    85e44eb1e8c5b2911f8d6fcd339d4b3079b61eb4

    SHA256

    e39b7fbb84070e09b663dde6fe11b1048eeeede75c5eb521af28530389cae0c4

    SHA512

    5b61adb8ba73ef00db17183c9d569f9eb20196d05946ae082bcbf21aaca483b76ca83fb108329f73150bf43108a9c970474037861bc12a09f3d998de8d4057f6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    74d428f926b5074e36fa90d95e62562b

    SHA1

    10cde2c025b0ba54e2db7f62361eaf997dcaf809

    SHA256

    789aead133fb0e02cdd5bcdde485b3d05069f533fdff1291faa9233c2f904ae8

    SHA512

    1491bc131ef0f27d47e818932c42739d47333fd562a94553af2d3ec76d110ec34ce5ebd5cd7feb4a28fa70551cd1310a92cebcecec6e6a4577f9799629177789

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR\WinRAR.exe

    Filesize

    489KB

    MD5

    08577ac7a59b0fd8035817e0e35a16e6

    SHA1

    743c6bfeae542d31075d1b07c330b0d3c1742601

    SHA256

    5b97980d9957d38ef4d7ae2e499c217b7598de818689fbcab5cde3eb33c9110c

    SHA512

    1dc32f766deafe35132922406d5d5c4ebfa18382010c4847e7236ea1c8e95e78011541c6dde04343598b12a07850e136ec8287b4363ac5586dd3c33ebcfba66e

  • memory/1664-10-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1664-0-0x000007FEF61FE000-0x000007FEF61FF000-memory.dmp

    Filesize

    4KB

  • memory/1664-28-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1664-11-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1924-121-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-117-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1924-120-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-118-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-115-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-113-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-109-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1924-111-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1976-103-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-101-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-107-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-99-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-97-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-122-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1976-123-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2276-124-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-135-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-126-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-128-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-136-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-130-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2276-133-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2704-32-0x0000000000E80000-0x00000000019BE000-memory.dmp

    Filesize

    11.2MB

  • memory/2716-29-0x0000000000E70000-0x0000000000EF0000-memory.dmp

    Filesize

    512KB

  • memory/2716-89-0x00000000042F0000-0x0000000004318000-memory.dmp

    Filesize

    160KB

  • memory/2716-66-0x0000000000E30000-0x0000000000E74000-memory.dmp

    Filesize

    272KB

  • memory/2756-80-0x0000000001FA0000-0x0000000001FC4000-memory.dmp

    Filesize

    144KB

  • memory/2756-67-0x00000000008A0000-0x00000000008E4000-memory.dmp

    Filesize

    272KB

  • memory/2756-30-0x00000000000C0000-0x000000000013C000-memory.dmp

    Filesize

    496KB

  • memory/2848-31-0x0000000000040000-0x00000000000C8000-memory.dmp

    Filesize

    544KB

  • memory/2848-88-0x0000000004300000-0x0000000004328000-memory.dmp

    Filesize

    160KB

  • memory/2848-68-0x00000000021B0000-0x00000000021FA000-memory.dmp

    Filesize

    296KB