Resubmissions

22/01/2025, 03:19

250122-dvay4avrat 10

22/01/2025, 03:06

250122-dlynssvmhx 10

22/01/2025, 02:59

250122-dg5xbavldv 10

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 02:59

General

  • Target

    Async RAT v0.5.8 Türkçe Versiyon/FastColoredTextBox.xml

  • Size

    132KB

  • MD5

    70d49dec6a333f1d94fb1e77c663525c

  • SHA1

    184b544e672f4c4cb9ed9cf010da568eed16623d

  • SHA256

    f3f2e537065317b6ce66dac64042e925bbcea65f00561f9860b7172c9ca07027

  • SHA512

    b78a3c4418a7c5014eb16e72f2113f00353e9e566942f7160067c826c47f1ec2752ae7ede796fc159fb9bae499d347f822401fbc4446e2556cbd680cd595c2e2

  • SSDEEP

    1536:45SVw7sekyF7o//t3zEzacGE5xa5lIV1/P5:45Sm7sekyxo//xzEz3GlM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Async RAT v0.5.8 Türkçe Versiyon\FastColoredTextBox.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3789502a2405736c2e9bd0a0e327f96a

    SHA1

    0a297edd78efd631d61d440f0a0b063a40c1caff

    SHA256

    f0296af6e9ee3f13f2fee113509749f056952216a5528ddd9888b13bc82ec7af

    SHA512

    8a529322dd7d6f7610e022e7b46b6695c6103478bba3319d0ded28852e7e168907a70998e6701a4ba7c7607ab5fb9b2b7b04825862e54dd7fd4f2c9f1aa87793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ed73103b31aae31f90716b9c6b51ac8

    SHA1

    eae68117d08c80133c6b277f1aaf093d31e7122a

    SHA256

    c0f52ec4551064ff46e6e9299537b4d422a839f41bc6ea621e5a3691a3ae63f2

    SHA512

    f025a95806272ca01bb0c6032d27a6faa7d5bbc5263e0246889a36ec154fad656395d8fddeee8f05dce40e2910f213b502f560fed4f0b5b7d6e9f2998e95f186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d31b432885c759823aeec501338b73bc

    SHA1

    337fb05fb0da53546b02020df08e1d855f808ebe

    SHA256

    b13207876246b7493a1c0a1dd87630b7af590e8a11e592a133b9e557ab6865a1

    SHA512

    045715093395422e0f5982d71793ef8428da1d585d5c221b07b05a5f32c3a63cee947c6bb3d61bc29c8f75ee67ca3d951a54bb82a1e793fc1507c9152a4d1721

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fdd79c526a0017dcb06ce9e61473c51

    SHA1

    763b60f7a0b704e5cabf71cae40cd8b47dc41923

    SHA256

    09329bea8d537ae3574128204bc695b34ecbfe834becbde0435f8ee2435c4f49

    SHA512

    585a0337d4af70048d86bb74d01b1202dc502b8dc74ae95286e49700b781ba6ee652e1dcb912f214d74a5a47b1ea1faa0a242915ada27a7b7a990e8e5ca7d19a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bfe0c1852e597171445c3918441269a

    SHA1

    fa217f2167c1ebc3de24ab650331129f7f2ed028

    SHA256

    d23943a65e6d476467405ec59a4ab5db7b3cc035961a6f94342a0d68ea74567c

    SHA512

    bd687d7efd691d6b84b63673114e31d9660f56304933a825d3ecb43983a2446b8c218503a773cd42e780f2853a8fdd7c4e610f3e8fd3030e3c32ebdefa533b33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2a6c41b54290009610455659a661e33

    SHA1

    178e1d4ffa00d359c408115e095391788c8b3cb2

    SHA256

    1195f5870b85e7708e6bd2a9021f0343468443e440269bfd2d3b94d58106b25e

    SHA512

    f06c3a8d414e5989f9384501f4dd960950117e81b4034c73cfa601403f0920dad56dccc55fd5cdb330f662a9ed4eadca28529b155c75d7d2807c17c4f11b6da6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd83af1d80af28dc994ff73d6a251e23

    SHA1

    100637cc468f56b576b1db9087b82e9abc0cda91

    SHA256

    d2b9c8b8c5b36787300dcb6d1ae4390dde5a2822e193403dddd9761d8b7b3b61

    SHA512

    01211c7a84f469ebcfe7abb0560453306ef6b24f753f996d273074d985c241bb9033d4c23f9f1db04e97cc7f9d086e571da3205a50b112c1867e88a6784c1662

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bcb7abfcf8084c79819b47bf3212fa5

    SHA1

    de800ae326001d4c32333d60e0438a6c7cfcb115

    SHA256

    fa2f1cf7dca683079714484bed13bc81087db45e20d779f59b922a0d3bbd430e

    SHA512

    992b29349f7a0590316545b0f7045b387b6abb3caf01458440e330ccc66324f789bea08eef9550b85b8d0acacafe569dcf8f233c122fe21752843c189fe94149

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab3d91501369279681f1e1f81bef6e7e

    SHA1

    2b43c13ab4602144b62df8e203fb20f3bf59f690

    SHA256

    02b09598c1c74c8ec7edb1ef957a09b8c5580fcfb224f5dab7cfd622359aefbe

    SHA512

    494bbdb5a2bcdb71075d4ff8b1ead74413422fd042f2fadc0fb2bbc2b140f0566dcc29e82bc7ea20613a924440e2542aaa7411e022af7512af5910d6d0601f07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7350174ed479f82b3dd90b144f19f68d

    SHA1

    70d8d408d0ba9ed37c30bfaf75cc71694783fd15

    SHA256

    45db03d6f63fb8195fc1481c24d64225903efa7c308f5a287ca80b938b5d4e73

    SHA512

    93255b060a06e7efc950986e75c72670629231a37160299e41eb295ca3087b6e3470629e8f30a3bca4a67e05d234bae880ebd90dd91b7b50aba179474a999df2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed01413e88d75aedfbe0df44d545acb2

    SHA1

    fd86cb598193c5600edde94066a0ed93f319fda9

    SHA256

    06810e74173b8598316ac33d8389111eed9b3971ce33620c05237e345b304ec5

    SHA512

    3404fb5d9490f3d384722e36e41f0b4f10f6c82b9552ef70579cf08633736f40e914ec0e2ae759f6682d8846a488afe482115b0bb05fcdeb1c96e45e71144660

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9712d16ee25f16cd8c5ad6338e782e8

    SHA1

    358a59a7b3d9b3cbb9b1f72d65a6dc30e707005f

    SHA256

    d95cf3b7801c85178b002c94abb24c6cdcbb6c7207281c7e6d2efa4f5518b1c6

    SHA512

    a972423820c307a6f5747b1069cd0bf56109f7fd1b405d7ed8f9a199b7247d9b986cfba52ece52d27792ce966634072b9d50d50c010ed61515e42f8b8a443b1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d02cda4e2d45c7ea7c3bc1d0ebfd25be

    SHA1

    d94b08f67c9d14e6449d7e95887ff0183ea1de2b

    SHA256

    277d297cb90772d18e5cd71de5aebd5cadaa2a02e34875c7678e550406c84bb3

    SHA512

    8df6d4831eaf0e04d02dc877f21bb478ff92f215860d91b93f1a3c21f92d3c08911c7c380f56f0876ded6456ad71dbc7bde0a3b45ae7191037757d2fcc08555d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9913f8bab949cf0a3d3d4aaff0ecb2d1

    SHA1

    a81e5d987d192d3404192557c225b4c17a68a7ad

    SHA256

    52d5b4e078b66b8864fb5e765d7387ba0064eaa02caeeb0b6d1986fcb1bbffa1

    SHA512

    8cb27a3d5240f31d45ef29c0361da794a5148f4389a94e154c26cd1426c55b37f097566fc22cb53b9d48b2abbd585111d989ce60a45818decf663f16f8aa191c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acb7e4a5a220b0e5151b467ed05c0481

    SHA1

    30aafe0bdf933ed13f434a201d8b82198a5d1611

    SHA256

    b42d9b7d58bab83f9da57adba7b9b3df9b6c0a51b1b5b92aac409f7902e5abd6

    SHA512

    6a7ecf8235e68589c44949d71100d6314c0bd583faef9634583137e5ef148dd99eb783f39553ee6f2827720ebfd9ed43a5578089a6828753479b344e26d0236b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb2cbdda926ffdc05063f7b8b4bddfd4

    SHA1

    af7f34a13c63bda9ce5fff99e0061666fefbd554

    SHA256

    bb0a3ffc947556f9d4f3a00bb1e262df25079234bcedac94f1aa6d7be5283458

    SHA512

    faead06133dd42436aa156e5f923f027eb6c340a052f972da8124daf553763681ccc92c6c40e8fac597d6f31150ab4764be2e97038095e432cc0613ba0be2e1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81e774b4bf6ffec9852e6148afc368b9

    SHA1

    846959026f9e1cf7ef5693344c0b99b60bd64679

    SHA256

    3397c49da7f15c81823b4b64550638320cbb8279f53243d3b33e49af8cec1663

    SHA512

    e2a3ad60d33c4413897b7aa3c20a6cf767dc3ec242af9d7b268976a22eac49a05c55c453b86fec929ee65e5818bef1a06362b609447e3dd5c36dd8ca57933ee6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee3c55124195aeee8215852214bdcc44

    SHA1

    cac63d9abd0e22b9df9b6fd95b75b2d2e0ad7354

    SHA256

    ccb5ca6c3d3b09623e550987f433e3e14aeb0dc3842a77c161d8b72ebe376b54

    SHA512

    cad52cbddce34f583460b17681d72ae4b1d2d99dae906817bfa4e092245a50251ee6b8af8f627a704103b868edaaf10fd54176d8e192f810dcd73ad4ff231244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    055ebae7bac4cea02c3f884a3c70fa86

    SHA1

    a79b9abce3eee0019625ec6f5ad42ae99a0ad5b6

    SHA256

    96f6a6891c71a47490c2de10a4d9b22cc970e2e01d4be3331863289519b7be42

    SHA512

    e2cafed81ea81aa4f2c24c66992904cda9194511c5443eafcbcba358cf18034de362c4786c7e07c4cc1cbb3ddc1dca10fc64ccf15f00be9fbe9f03b4f073338a

  • C:\Users\Admin\AppData\Local\Temp\Cab8A08.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8AB9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b