Analysis

  • max time kernel
    94s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2025, 17:23

General

  • Target

    VER PROCESO ORDINARIO LABORAL VINCULADO CON RADICADO 20019-70-32971-2025-00115-00.exe

  • Size

    1.2MB

  • MD5

    d4650c7f2f955b87f7e302bc1ff5f915

  • SHA1

    af2ac3a4aeb384b125b4cb3b2a91c90885289d77

  • SHA256

    4656baa84cbdc5ef1a8403c5eeeb04053fed70e850ac526bcdb41b4ee57c2665

  • SHA512

    b9873e334463eab6022a55823032c64b848bd029591ac891b30763e1bb9c7c2a69fe5c87492f3f32ae7ca8fcfe128e7e3fc24ff67b0ba9917a9bed9c1d60d8b0

  • SSDEEP

    24576:cq29sJfyesnhtH6QQBzet11bP6YfbRd5SpH6gJa+lhB/LC+S7l39:cqkMOnXaQRn6SpiH6gvFS7l39

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3420
      • C:\Users\Admin\AppData\Local\Temp\VER PROCESO ORDINARIO LABORAL VINCULADO CON RADICADO 20019-70-32971-2025-00115-00.exe
        "C:\Users\Admin\AppData\Local\Temp\VER PROCESO ORDINARIO LABORAL VINCULADO CON RADICADO 20019-70-32971-2025-00115-00.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1184
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

      Filesize

      4KB

    • memory/1184-1-0x0000000000040000-0x0000000000176000-memory.dmp

      Filesize

      1.2MB

    • memory/1184-2-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-3-0x0000000004A70000-0x0000000004B76000-memory.dmp

      Filesize

      1.0MB

    • memory/1184-4-0x0000000004BF0000-0x0000000004CF6000-memory.dmp

      Filesize

      1.0MB

    • memory/1184-5-0x0000000005420000-0x00000000059C4000-memory.dmp

      Filesize

      5.6MB

    • memory/1184-6-0x0000000004F70000-0x0000000005002000-memory.dmp

      Filesize

      584KB

    • memory/1184-26-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-16-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-48-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-58-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-70-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-68-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-66-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-64-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-62-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-60-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-56-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-54-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-52-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-50-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-46-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-44-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-42-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-40-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-38-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-36-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-34-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-32-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-30-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-28-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-24-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-22-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-20-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-18-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-14-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-12-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-10-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-8-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-7-0x0000000004BF0000-0x0000000004CF0000-memory.dmp

      Filesize

      1024KB

    • memory/1184-1329-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1330-0x0000000005060000-0x00000000050C0000-memory.dmp

      Filesize

      384KB

    • memory/1184-1331-0x00000000050C0000-0x000000000511E000-memory.dmp

      Filesize

      376KB

    • memory/1184-1332-0x0000000005140000-0x000000000518C000-memory.dmp

      Filesize

      304KB

    • memory/1184-1333-0x00000000749CE000-0x00000000749CF000-memory.dmp

      Filesize

      4KB

    • memory/1184-1334-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1335-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1336-0x0000000000570000-0x00000000005C4000-memory.dmp

      Filesize

      336KB

    • memory/1184-1342-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1344-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1346-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-1348-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-1349-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-1347-0x0000000000340000-0x000000000035A000-memory.dmp

      Filesize

      104KB

    • memory/4304-1350-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-1351-0x0000000000BA0000-0x0000000000BAA000-memory.dmp

      Filesize

      40KB

    • memory/4304-1352-0x0000000004F50000-0x0000000004FEC000-memory.dmp

      Filesize

      624KB

    • memory/4304-1353-0x0000000005060000-0x00000000050C6000-memory.dmp

      Filesize

      408KB

    • memory/4304-1354-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-1355-0x00000000749C0000-0x0000000075170000-memory.dmp

      Filesize

      7.7MB