Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 04:02

General

  • Target

    c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe

  • Size

    3.6MB

  • MD5

    ec6412e356b57c420abd26cccdb8c140

  • SHA1

    0f386e23c2a088a017cdf5aba237ff816265285a

  • SHA256

    c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bd

  • SHA512

    9ea1acccbc13cbb2566eb97e39e7b40bf3b4b7f214122a72d941e4563de6eae244b6bb3c632d569254101aa8f12adf6ade2e068430a8b7e103b8113306cef1cb

  • SSDEEP

    98304:kkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:kkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

51.89.44.68:8848

Mutex

etb3t1tr5n

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %Temp%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:5008
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3404
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1444
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1172
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:1516
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:528
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:3268
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:4720
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3908
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            PID:4884
          • C:\Users\Admin\AppData\Roaming\svchost.exe
            "C:\Users\Admin\AppData\Roaming\svchost.exe"
            2⤵
            • Executes dropped EXE
            PID:2300
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c49d5c25-a8e4-451b-8e05-74732d114ab1.bat"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:1544
              • C:\Windows\system32\taskkill.exe
                taskkill /F /PID 5008
                3⤵
                • Kills process with taskkill
                PID:1880
              • C:\Windows\system32\timeout.exe
                timeout /T 2 /NOBREAK
                3⤵
                • Delays execution with timeout.exe
                PID:4644
          • C:\Windows\system32\msiexec.exe
            C:\Windows\system32\msiexec.exe /V
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:5068

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\Browsers\Firefox\Bookmarks.txt

            Filesize

            220B

            MD5

            2ab1fd921b6c195114e506007ba9fe05

            SHA1

            90033c6ee56461ca959482c9692cf6cfb6c5c6af

            SHA256

            c79cfdd6d0757eb52fbb021e7f0da1a2a8f1dd81dcd3a4e62239778545a09ecc

            SHA512

            4f0570d7c7762ecb4dcf3171ae67da3c56aa044419695e5a05f318e550f1a910a616f5691b15abfe831b654718ec97a534914bd172aa7a963609ebd8e1fae0a5

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Apps.txt

            Filesize

            846B

            MD5

            70ac7f8bd1254ac829a2151f0a04a4ec

            SHA1

            c0ccf392bad8d30d05c9962cb6dc982be88fadc2

            SHA256

            b56228757f453a8eecaf4f589c61b3a1beb95a3955bda2fb4b51ebddd1254856

            SHA512

            7f0ccd28a39c5db4d65962deb51730ed432f9fd581fe7c637072c30266b34ff07e0ac101e9f8358ec46a3a397b842b7335a723066cb253f85dbaa7e643c13977

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Apps.txt

            Filesize

            6KB

            MD5

            4ac5700a2dd09c536e678dfef3b486b5

            SHA1

            826439c1bd20e0270fef09d831000eda3aeed5b3

            SHA256

            af3e7e0e95eb940924e0a0b6959ec96416447262c36d35e29aa6206635675d93

            SHA512

            c92231e67a2821a7323f005d9d36e2185ca605b0d8e821ef7d33d398f8bd76076cabc439bf67e10535c3541aa4bbc1375158b49dd3c5838100c57456d2be8df7

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Process.txt

            Filesize

            1KB

            MD5

            315348da439122761656e5a2dcb930be

            SHA1

            e4520d954df6bb09e8f8efd1e5f8cec030a4bdc6

            SHA256

            0aee4e2225856d78ea07f851efcc7a5ee9fe0d9e7b85e3d27feef4500aa4c76d

            SHA512

            f1a1c6e8a413bce632f31379dd9cec364289bbb5b0f936e36637881a98ff89e0344b292a2eaa041e7875d439ebe0cc8275a8c00c96dbb415ecc669af974028e2

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Process.txt

            Filesize

            2KB

            MD5

            0a235bcd22016a58fa52afd6ddc00081

            SHA1

            9d3305282b4e5357261f54a7a05b31c1d0fb232c

            SHA256

            e95e827ea5669601411309057ef227e13e1c6f6fbdbe54e850b8135eca74cb77

            SHA512

            decbd5ae7ec0de463475fc44130291367f65af1918890c935a0c7c2d9a38f41338c908a4accd41aa087823b997d63a605751f9920e4ed052b45d7aee18b5f374

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Process.txt

            Filesize

            4KB

            MD5

            27455783d5f62fa490cc6ddbcb562f99

            SHA1

            4211088311153518a91105d556bc45942acd6b2f

            SHA256

            45fe37e3be16823426f1c8dfb7521fdb746fc552c3059616bceb0fa8b3766671

            SHA512

            12d47094353d6ada2acb9f236421a94e1b881897488f9064ca2d9d3851b1c1cc38a902ea3edc6e44e6bade07a37dbd573eeef1773cfa8e39b6e8f203ed3ad9da

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Process.txt

            Filesize

            797B

            MD5

            d8c2ce8ca82f2331b1211382cf305180

            SHA1

            d0813d26b612b2fccfe458ec9581077d1515f814

            SHA256

            44edf5b14e3d7b00f3d5980ea6cfc21feb622087858f06fd8d2eb3e3d65feabd

            SHA512

            ea7d2bcc4a485473906b43b1824bc94cfeb4dc1afeb52461cc5de033278423bb3f0580f7f712b2e10f92e80bcef6b1939405d0c6a562d65dfa4231609d8238fa

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\Admin@GYHASOLS_en-US\System\Process.txt

            Filesize

            1KB

            MD5

            55324f002ed4292d051136fe1889489e

            SHA1

            b63d3b65fa3a722886703301955712ec4376728a

            SHA256

            d063cca563cd6be74c546fa39abf930758151e397e13433ffedb29c6b8a98942

            SHA512

            22523b77c440ff00a2fc41cb58d8c99628fb45118f917e73c83ae8951a3aed456547a047394728d7b1c24429c476a387094ecee3e3ab5acc15e1e5f3567f2dbd

          • C:\Users\Admin\AppData\Local\107eadc90e9f55c69f9ea96fd828a243\msgid.dat

            Filesize

            2B

            MD5

            9a1158154dfa42caddbd0694a4e9bdc8

            SHA1

            a9334987ece78b6fe8bf130ef00b74847c1d3da6

            SHA256

            41cfc0d1f2d127b04555b7246d84019b4d27710a3f3aff6e7764375b1e06e05d

            SHA512

            b0103360d3bbdcabc75330522fca1366932d63944a4364f2fd9d1d4b935ecab5828b332a39efe9aa635af5e17a8c00fb7c18a3fef6a0e37e3453d73e4180e0a9

          • C:\Users\Admin\AppData\Local\Temp\c49d5c25-a8e4-451b-8e05-74732d114ab1.bat

            Filesize

            152B

            MD5

            5b8b2d48778ccbe9fdc5ca16d5e9e095

            SHA1

            8cafda519024d6eb2edae1459696112dca0113f9

            SHA256

            8b84cb3ca1e55ce21f30601c86061719b33600b3782061081dd8af283191f415

            SHA512

            797b682b807cd9c4c015dec23e5960a710936e1554e5ff1c5edae9ec66d4005b888ec927b7c5b8144c4bab51a804acd2c753bfc758d8bfa4cc1ac69c18e5ec56

          • C:\Users\Admin\AppData\Roaming\svchost.exe

            Filesize

            63KB

            MD5

            67ca41c73d556cc4cfc67fc5b425bbbd

            SHA1

            ada7f812cd581c493630eca83bf38c0f8b32b186

            SHA256

            23d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b

            SHA512

            0dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02

          • memory/3404-16-0x00007FF9DB8B0000-0x00007FF9DC371000-memory.dmp

            Filesize

            10.8MB

          • memory/3404-15-0x00007FF9DB8B0000-0x00007FF9DC371000-memory.dmp

            Filesize

            10.8MB

          • memory/3404-14-0x00000000003C0000-0x00000000003D6000-memory.dmp

            Filesize

            88KB

          • memory/5008-17-0x00007FF9DB8B0000-0x00007FF9DC371000-memory.dmp

            Filesize

            10.8MB

          • memory/5008-1-0x000002EEF98F0000-0x000002EEF9C8A000-memory.dmp

            Filesize

            3.6MB

          • memory/5008-235-0x000002EEFD810000-0x000002EEFD854000-memory.dmp

            Filesize

            272KB

          • memory/5008-236-0x000002EEFD870000-0x000002EEFD88A000-memory.dmp

            Filesize

            104KB

          • memory/5008-319-0x000002EEFD890000-0x000002EEFD942000-memory.dmp

            Filesize

            712KB

          • memory/5008-320-0x000002EEFD970000-0x000002EEFD992000-memory.dmp

            Filesize

            136KB

          • memory/5008-322-0x000002EEFD9A0000-0x000002EEFDA40000-memory.dmp

            Filesize

            640KB

          • memory/5008-2-0x00007FF9DB8B0000-0x00007FF9DC371000-memory.dmp

            Filesize

            10.8MB

          • memory/5008-0-0x00007FF9DB8B3000-0x00007FF9DB8B5000-memory.dmp

            Filesize

            8KB

          • memory/5008-342-0x00007FF9DB8B0000-0x00007FF9DC371000-memory.dmp

            Filesize

            10.8MB