Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 16:19

General

  • Target

    Payment Invoice Copy.exe

  • Size

    578KB

  • MD5

    e3bbcd9ecd0c7a43d84c42f47877d766

  • SHA1

    d2fea2b4fa4ded44078f641932d8399af76a9370

  • SHA256

    142615d8e77bb22a168f6f26f374b99b06fa2bc6942627c4170e0983ebdc60ed

  • SHA512

    e3bf21da59e7446c28e28777c4629d9003615e5b5e31b80635b47b6f34220f240875de0340f08dabbefaedccbaf1e792d5ce0e5d51131074cfdf849a38db4e66

  • SSDEEP

    12288:yk/2L2IW2iN/2iNL3uMLdsiqoGksTLCu5ZkbzUH:yQ2Y1J153uM4oaLGzc

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

23.92.209.138:6606

23.92.209.138:7707

23.92.209.138:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment Invoice Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\Payment Invoice Copy.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\Payment Invoice Copy.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment Invoice Copy.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2604-18-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-8-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-23-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-22-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-20-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2604-24-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-10-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2604-12-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2684-5-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-7-0x0000000000D90000-0x0000000000DA2000-memory.dmp

    Filesize

    72KB

  • memory/2684-21-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-6-0x0000000000F30000-0x0000000000F86000-memory.dmp

    Filesize

    344KB

  • memory/2684-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

    Filesize

    4KB

  • memory/2684-1-0x0000000000F90000-0x0000000001026000-memory.dmp

    Filesize

    600KB

  • memory/2684-4-0x0000000074D3E000-0x0000000074D3F000-memory.dmp

    Filesize

    4KB

  • memory/2684-3-0x0000000000640000-0x0000000000658000-memory.dmp

    Filesize

    96KB

  • memory/2684-2-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB