Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 01:22

General

  • Target

    F-M-E_v2/crack.exe

  • Size

    3.6MB

  • MD5

    b7882c8eeb5328a78cc3ea7b6b389695

  • SHA1

    174ad6cf4a52901e23f4346b9866ab88fcf9ec7a

  • SHA256

    52278c5c508198f8628a8c32687e63d5420e4940d2845aa963804dbee45ae737

  • SHA512

    170a6142fa81b45b20d234e91b63c4cbe5b5155126f921a7c8839ed01bc1ee0e0fe116fc3515fb7909b3cf77a22bac3830acf2cd12c02249f8814509e8f82da5

  • SSDEEP

    98304:QkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:QkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F-M-E_v2\crack.exe
    "C:\Users\Admin\AppData\Local\Temp\F-M-E_v2\crack.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:1248
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2832
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3464
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1656
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3692
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:716
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3140
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:3532
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:2044
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4636
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            PID:2852
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            PID:2740
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5a1e588c-375e-424d-b45f-3e2a39132c37.bat"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:676
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:744
              • C:\Windows\system32\taskkill.exe
                taskkill /F /PID 1248
                3⤵
                • Kills process with taskkill
                PID:2424
              • C:\Windows\system32\timeout.exe
                timeout /T 2 /NOBREAK
                3⤵
                • Delays execution with timeout.exe
                PID:2012
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2200

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\Browsers\Firefox\Bookmarks.txt

            Filesize

            220B

            MD5

            2ab1fd921b6c195114e506007ba9fe05

            SHA1

            90033c6ee56461ca959482c9692cf6cfb6c5c6af

            SHA256

            c79cfdd6d0757eb52fbb021e7f0da1a2a8f1dd81dcd3a4e62239778545a09ecc

            SHA512

            4f0570d7c7762ecb4dcf3171ae67da3c56aa044419695e5a05f318e550f1a910a616f5691b15abfe831b654718ec97a534914bd172aa7a963609ebd8e1fae0a5

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Apps.txt

            Filesize

            2KB

            MD5

            e3f75a89d2df3758befa7b61d7510832

            SHA1

            74efcab9032c952a7c009c768abe96977486ac00

            SHA256

            02bd6c749154cb67853efaccf8e0eeef85111947ebc4628e24c836d59478551b

            SHA512

            f7bd2cddd89f36dec0b65b36b4f3e21c48dbc45d7867f7af1f63ff4a5e3bd9d1c291ac7728b926028038e1dfc923dbefe248b3e8ef466bc61f15a0f418693784

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Apps.txt

            Filesize

            6KB

            MD5

            e1aecc7c83f4dea5c0889b280c6e2289

            SHA1

            089303b2e7d030ddc1df5342ba3eb30c01f6d6ac

            SHA256

            26654911f2492aabb5475898964539af10ac28bb24aa4778b6cee96d549249f7

            SHA512

            8e24597e3eb3aa8ec57837beb4ec744fb08beda9d6bdc9b77f90b69dbaae2e8dfc9625238c0fc66bf62299218bc6456bfd3044da0bb342bd8e4fa4cbd35f779a

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            1KB

            MD5

            c69b5c5435730f1c50e1082b9e1fc8bc

            SHA1

            d3bdefe91d04d5c003e853c60c370bb08d7a50c1

            SHA256

            1022808186668cea2c9dc097791fc0f48b13ba695339d1a9e2c32042f1ee601b

            SHA512

            51511f00d8b00af93d114ab034c32763a5eb31c276fa5998d0725697bbb1614b31ac32e90d11e3bbdd52dcb22231f6b4628dd2cd3312b5d6ec66c6039eab49d0

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            2KB

            MD5

            4400077bcbb92599be49fa9419ee9b30

            SHA1

            19e1faa304e6bcbd55a805f051978096980d3284

            SHA256

            c0874ec088816995f396a4edf753823e3cc6b4fc1ef7f3633f68aceebf2a37ca

            SHA512

            c3c2345470934e381a5ed9211c7d6b01a6b848348c38b531e0775c3a8101c108d12603be5d318d97ed2120d7cc4576fa2ed77bf413ad3309e4b552a9938404cb

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            2KB

            MD5

            214d821690e60f1ff1ab3b62f3fa25ab

            SHA1

            4d754032f899946051abced3ce46b8f660691b6f

            SHA256

            783345166a782f6b5f4fea7fc68bc262dc53ad9cd4e1e4f8bd7ba91025455d3b

            SHA512

            21702fe572bc4c06ad938e08cb6e89d6a418879393bc3954c8ef2219ed8bdb303593ab0ad5e869f6e7b8aa55e08db12702e5d94ab9bec9e25ea8d28b849d557d

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            3KB

            MD5

            cdf0b2d016120be6124d8bb54c534575

            SHA1

            dd25abe97f64d8ea42c6143aebc0978d0765d172

            SHA256

            f5603f5990ab3772ac99edad4457d79147c8f94a391f8e2a577bb5bdaee1d5f9

            SHA512

            43872b2793ef8ee846b81a646e358a1b404fae492454302aa051fc39b6fb38fe9feb0210c87dfe3530254340549593a6e5deb8aad6210e9622ce6d7d141f2690

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            4KB

            MD5

            b6872140f8593dba063a4ebb0e410d1d

            SHA1

            d3d4f0f3931726967f41a9144d0f7254dddf990d

            SHA256

            24d8413ebd5ef151d63f8321751d3494860121753ee1a3ff5169d49f4384f884

            SHA512

            64ba825a5e16e29a5cdc89360d3e0fa0abcf38f5077a8f42581dae6c4294eecda97a42da428adb80b8e96e960d147c056f35f5ca818853a8d56d81ba98c9aa83

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\Admin@HGNBWBGW_en-US\System\Process.txt

            Filesize

            391B

            MD5

            549e3b78f4851cfd44616e15d896d67a

            SHA1

            161935bda828b9ce8b9f256e25e7ddc8da71d8d1

            SHA256

            9f43af8a412c7ce469272d89acf81fc4fcf61e0cfd92ba9ba1c9e9e72b798292

            SHA512

            9c70c946a50d8da236ef3d6a6f8f267fe0e160ed117e913600a186c91566d3525d648ba9f7e724bf7e2e1a47d84f624c2fae284efb379563eccaa7e0c0150074

          • C:\Users\Admin\AppData\Local\4ccbe0c054aa1582d63cc1ace57a5a4d\msgid.dat

            Filesize

            2B

            MD5

            6ea9ab1baa0efb9e19094440c317e21b

            SHA1

            7719a1c782a1ba91c031a682a0a2f8658209adbf

            SHA256

            35135aaa6cc23891b40cb3f378c53a17a1127210ce60e125ccf03efcfdaec458

            SHA512

            a64c0e99969683e7224137b2726353ffd630fc15cceda1c75169daef65c9802a54dfebffa3902943044fe3273ccce95d0ddfff08fdbae388357a79ce891cfe38

          • C:\Users\Admin\AppData\Local\Temp\5a1e588c-375e-424d-b45f-3e2a39132c37.bat

            Filesize

            152B

            MD5

            6d5eafcee70d36505c46005f442e42c5

            SHA1

            f159dcc44dd665192d4f7c8ef01ccc4d12aea1df

            SHA256

            cdda276392484d94f494435cec14750bdba6cbde4af22550516820f8408964d8

            SHA512

            59fe9499a67a5569b648c329804e91e71b2ab7648c7241b8dc22db0959c67de47085fb8085872c2e190c3ba82ab9ddbb616e61f5ab3cbe8fe1694cdc8b2372ff

          • C:\Users\Admin\AppData\Local\Temp\Stealerium-Latest.log

            Filesize

            4KB

            MD5

            79204ab18fdec90b60bfa2d721874218

            SHA1

            2ae379d79a1a9f99beea0113f771719adb637de9

            SHA256

            2e17428b1f8e7cfc53a3845ab50dc4d63254c238e5a9911650c25ca9d9b891b0

            SHA512

            060e92d904d41fbf85062c844ed722a6c0d57b559725cf752ca320225659c443bf8344c8f7c7e79061193218a3cd5a1218826a89b633a9e264968687dbed0b2b

          • C:\Users\Admin\AppData\Local\Temp\Stealerium-Latest.log

            Filesize

            1KB

            MD5

            5833215642bba52923b73d79e04d9cc5

            SHA1

            5bad73cba9898ecf095a6db199e0f7b6fa4b9f5c

            SHA256

            84e6e74f75237eb432d0cbf5a7b79ffc13a92dedfedd4b50c1cf70ad7f2275a7

            SHA512

            f86387723e1442ed5e9be6d94cd2cc3407feb6e2de919ffe87136bca80ad2a0827ae0e9ee79cab0debde9e153f48ce36484c59227415dd8060ccd13c4fe45896

          • C:\Users\Admin\AppData\Local\Temp\Stealerium-Latest.log

            Filesize

            2KB

            MD5

            bf415b1e9a96653103bdf3f831cccdaf

            SHA1

            d0cdf3df3bd32e0f8ae4078cbe5773d619085574

            SHA256

            cb2384ea879f0663f10c4f3bcc835edddf01c6e1c700de9c2ce8ac9d00068749

            SHA512

            c27c1df6eb8400f26c5654ca2eebd4a3979b1bbb1b53a0014068028ae02e8efcaa05740538f06c824b4e96e6a7d3b2eee96b5e4511e8b93858c4508bfcb0a06a

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            63KB

            MD5

            67ca41c73d556cc4cfc67fc5b425bbbd

            SHA1

            ada7f812cd581c493630eca83bf38c0f8b32b186

            SHA256

            23d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b

            SHA512

            0dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02

          • memory/1248-1-0x0000028FD1830000-0x0000028FD1BCA000-memory.dmp

            Filesize

            3.6MB

          • memory/1248-425-0x0000028FED9F0000-0x0000028FEDA90000-memory.dmp

            Filesize

            640KB

          • memory/1248-52-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

            Filesize

            10.8MB

          • memory/1248-464-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

            Filesize

            10.8MB

          • memory/1248-0-0x00007FFBFD203000-0x00007FFBFD205000-memory.dmp

            Filesize

            8KB

          • memory/1248-51-0x00007FFBFD203000-0x00007FFBFD205000-memory.dmp

            Filesize

            8KB

          • memory/1248-332-0x0000028FED860000-0x0000028FED8A4000-memory.dmp

            Filesize

            272KB

          • memory/1248-333-0x0000028FED8C0000-0x0000028FED8DA000-memory.dmp

            Filesize

            104KB

          • memory/1248-422-0x0000028FED8E0000-0x0000028FED992000-memory.dmp

            Filesize

            712KB

          • memory/1248-423-0x0000028FED9C0000-0x0000028FED9E2000-memory.dmp

            Filesize

            136KB

          • memory/1248-2-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2832-50-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2832-24-0x00007FFBFD200000-0x00007FFBFDCC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2832-23-0x00000000008A0000-0x00000000008B6000-memory.dmp

            Filesize

            88KB