Analysis

  • max time kernel
    66s
  • max time network
    64s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    31-12-2024 21:50

General

  • Target

    Multi Loader.exe

  • Size

    129KB

  • MD5

    f1430fd4573b819d0d95e7060045498c

  • SHA1

    d28c1eb1704ddcb7969eda8d30984ebe7b32944e

  • SHA256

    9fb99e04250dcb34493e704d8afa6b3754c9db94b3f3081e25539cc0747175ae

  • SHA512

    3b934624356f6047b9104cb19b93e1ea1396bcf9e36090659894b4fcf12bb979d58b67cb9dab0f7859e4c8fa875dfe69e289a38a2c4ab3a073af2b577240686c

  • SSDEEP

    1536:+RRQodSJYUbdh9EEw4cYu1qZWppqKmY7:+AoYYUbdRncCZWyz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    Windows.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Multi Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Multi Loader.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Local\Temp\Windows.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Local\Temp\Windows.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4992
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp84A1.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3876
      • C:\Users\Admin\AppData\Local\Temp\Windows.exe
        "C:\Users\Admin\AppData\Local\Temp\Windows.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1320
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1880 -prefsLen 23839 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0548e7d1-40af-4ef9-a47c-a20e14558abf} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" gpu
        3⤵
          PID:664
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2376 -prefsLen 23717 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce158886-573c-4b0b-836e-f885880a23f9} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" socket
          3⤵
          • Checks processor information in registry
          PID:1492
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3192 -childID 1 -isForBrowser -prefsHandle 2848 -prefMapHandle 3196 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab135183-d70c-4b66-b208-632847844e9f} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" tab
          3⤵
            PID:684
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3660 -childID 2 -isForBrowser -prefsHandle 2560 -prefMapHandle 2596 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8700e52-bda3-40ed-a1ef-e8ad6e0ce6a2} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" tab
            3⤵
              PID:4364
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4872 -prefMapHandle 4816 -prefsLen 29091 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c37fd30a-e639-4adb-b7b8-67e91b05316a} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" utility
              3⤵
              • Checks processor information in registry
              PID:4688
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 3 -isForBrowser -prefsHandle 5412 -prefMapHandle 5352 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d27131f5-7189-407d-abb6-41adb87b59e9} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" tab
              3⤵
                PID:2888
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 4 -isForBrowser -prefsHandle 5564 -prefMapHandle 5568 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf88b14b-5c64-4f8b-8149-8ca2aaeef9b6} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" tab
                3⤵
                  PID:4440
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5828 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c5add98-bc53-41e2-a84c-17c7d0e1cd33} 3084 "\\.\pipe\gecko-crash-server-pipe.3084" tab
                  3⤵
                    PID:4860

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\activity-stream.discovery_stream.json

                Filesize

                22KB

                MD5

                fdd6a44c83c1bf19a5a5cec8a280ee1b

                SHA1

                ba966a35e95e7e98a4f17775d82e4e9e5e67228a

                SHA256

                181f7987071f7c2b30644172b55acfbd2fb8976acc19a4a5a1910db103b05bc9

                SHA512

                5cfff83508c2fe8795eb00ba8efd84d20dcb9c99674c451be1beebded81dbf788aec52f3742c923a8c44f5d010fa28064a2f35a44a5d7db0a3f1a14ad64fa7a8

              • C:\Users\Admin\AppData\Local\Temp\Windows.exe

                Filesize

                129KB

                MD5

                f1430fd4573b819d0d95e7060045498c

                SHA1

                d28c1eb1704ddcb7969eda8d30984ebe7b32944e

                SHA256

                9fb99e04250dcb34493e704d8afa6b3754c9db94b3f3081e25539cc0747175ae

                SHA512

                3b934624356f6047b9104cb19b93e1ea1396bcf9e36090659894b4fcf12bb979d58b67cb9dab0f7859e4c8fa875dfe69e289a38a2c4ab3a073af2b577240686c

              • C:\Users\Admin\AppData\Local\Temp\tmp84A1.tmp.bat

                Filesize

                154B

                MD5

                c46fb2c5f6be4528371fb3c330a5c0b1

                SHA1

                175fdf98c7236a34ed148b505a6ab67618b9922d

                SHA256

                1d6acb7bf355e9b1dab7d00675be15cecdde290a9702180b608495be218cd859

                SHA512

                08262638749ed297c4b06f452806e85ec6b666c297c755bc83fe37448969e8d3bec142eaef53f16aed13f91e899a96b51b96c00461a8190d0d588c771d1258db

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\datareporting\glean\db\data.safe.tmp

                Filesize

                5KB

                MD5

                548a09c288edd0278d966e77c287767e

                SHA1

                7e39ed99c5db0f15eb6fa2935d70d0ecfd8ca804

                SHA256

                0306ababee98c799a7f3835ed3ed2e395a4572c7e6ca97f2dae446735510936e

                SHA512

                d12578fb1d2479ec243b435bbeeeb33739ee9c35d5ad1c9bc287dfc72b1d3988f2f9696a4725ea891ea3091f8922b539dff425babe01d61f17d0183fea8abf86

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\datareporting\glean\db\data.safe.tmp

                Filesize

                14KB

                MD5

                8c66fded1aa3750dbf5d05e6fb81d6e3

                SHA1

                ef9b6b8329e61c21425b8b652370816bb3cabefa

                SHA256

                922630a3e5b32aeae9d384aec09a155bb5aa1f70b160f242953923fbe34fd75c

                SHA512

                596ef5f030c1bdd7416130a115d1db7f2196dd1d6e109a46879de2dd66ce39f59881a04edb09eb2a6f4063c78da233ba954b22d8dfb94ed6681fa8547ddce489

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\datareporting\glean\pending_pings\156e4232-741a-4159-b2bd-50879155824f

                Filesize

                982B

                MD5

                89f48e1d9b10eb9038f235461ac3ed2c

                SHA1

                1d105e730e5b712a8860ce6874bf1738eeead16f

                SHA256

                0765259cb3f8193e2da5b816a471302aae57a96a9e00d3497257114adbea34b0

                SHA512

                3189d8a5a793abc8b30581f9e29d71dc882316b303829ffc9c3892024dd63c55623c87158a642494a6b1c88c787c1c300316896d26a81f1a9888789769551294

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\datareporting\glean\pending_pings\7aeebafe-b0dc-47c1-9bef-c983c402949a

                Filesize

                26KB

                MD5

                13cbdcede8abd93de2f22514ffda4620

                SHA1

                261974d8f3cb3ca603f0fdc4bf7d37e95700e821

                SHA256

                38598e4f625ef7f4fce3c3ab9ab22b95888a5cd35746f97bb36cd50c14df37ee

                SHA512

                6bc15195e36793f78c93779fdc87205f1fba70405e79673dd1e657c3484f43a73f50499b5aee24859eed0767b7374f09edc2ec9f79c6848f60f72882d033c1ed

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\datareporting\glean\pending_pings\fffc3d8c-302a-48d5-8526-8e128a050768

                Filesize

                671B

                MD5

                f5495fd9be9972e4cbc96ed4a7697f88

                SHA1

                e5ae3f071bf951b3a754b80d3b06f984e6e40e13

                SHA256

                8e2c5048bb62810d5606dfdb997508e53a74bf9030fc9773e8d692d3b0b43661

                SHA512

                0b8c92f7e85117dcffa0aeab81d0bff641b1a036dee04036606ad3b04ecf2a1f7f56a3a9e9a24960757f8bf0775c46645c6f54a05318c45fe4b645c0085da7b0

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\prefs-1.js

                Filesize

                10KB

                MD5

                796d59f2a184cbcd5948b308827d019c

                SHA1

                ac37d6e557945559636403f54c7530fce2d2424d

                SHA256

                3d32f66599e1ac699b540665a6ea1084d1ab11bbf43e6516c854edc26ee7d9f3

                SHA512

                cfd5089c855ffea68d3aedbb6016aebac01527f3c3fda42aa3406b2d4aa9dfac04c2a9d6c2b3b586835d0c48968c1a3839366679c5e2738451d3a1f35fd05b86

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uhqcqu3c.default-release\prefs.js

                Filesize

                10KB

                MD5

                6120096a86c045859ce1daa255330220

                SHA1

                462174a8d1dfba2bdd7b3c9b5fec5ab28343b48e

                SHA256

                3ec6f51f269bd8302f66397a4960465935926878665b1ca6bb87c919fab025c0

                SHA512

                e0eec0f02ee4c75b47cc27dda4ecc9aea8c7b3c71bde9e1d384b70820a438e47d087ba26920a25d69c299ee48cebe4819e54b95e845c87c1a2e30ec78c67728f

              • memory/2344-0-0x00007FFC242F3000-0x00007FFC242F5000-memory.dmp

                Filesize

                8KB

              • memory/2344-9-0x00007FFC242F0000-0x00007FFC24DB2000-memory.dmp

                Filesize

                10.8MB

              • memory/2344-3-0x00007FFC242F0000-0x00007FFC24DB2000-memory.dmp

                Filesize

                10.8MB

              • memory/2344-2-0x00007FFC242F0000-0x00007FFC24DB2000-memory.dmp

                Filesize

                10.8MB

              • memory/2344-1-0x0000000000DF0000-0x0000000000E16000-memory.dmp

                Filesize

                152KB