Analysis

  • max time kernel
    565s
  • max time network
    564s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-de
  • resource tags

    arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    22-01-2025 18:14

General

  • Target

    DemonSpoofCall.exe

  • Size

    9.7MB

  • MD5

    1dfe6d227d66658b9ab790ce66160551

  • SHA1

    62087a4f6c0b47635f068262b3d9df15aab746d9

  • SHA256

    c2d4aff226178355b8ef7b9e28e4d2869def12eacdfe91e9ed1135b6cd20deab

  • SHA512

    c10e34658ea727c52f96051fd9fe6d3c1b6f3dbeed9b9ced6bbfd2819db3a8aaeea693f890581190d3d10749e3000f8088c543d8cd006301c0b3032c4457d454

  • SSDEEP

    196608:lrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaoDKWzQo1OIg5sa7t:5eiYRNXnDZrSF8oF9uB5B

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:6606

89.84.63.139:6606

Mutex

caqxyzoxvrzhnrxwoc

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DemonSpoofCall.exe
    "C:\Users\Admin\AppData\Local\Temp\DemonSpoofCall.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Roaming\PDFreader.exe
      "C:\Users\Admin\AppData\Roaming\PDFreader.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4152
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4606.tmp.bat""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4606.tmp.bat

    Filesize

    158B

    MD5

    5874d6c320549e3b7a756c0cb2dc610f

    SHA1

    fb9f6e34c72ee3fc7c3a253c987c628e56c7dda2

    SHA256

    86b8030d081827385c002388b55ceb5a9ec7101457c491ffc6dc67db0e72c64e

    SHA512

    960bd67326d65e6e59de14e61370d599b504dca24cf113f0b600e53a4f2a97ffed90137c97f7dc4078d3b51dd5d1f6a03e62c4a2c0d331e33e9c018231fdc575

  • C:\Users\Admin\AppData\Roaming\PDFreader.exe

    Filesize

    8.8MB

    MD5

    f7dfe66072d3a91e2cd71436d4f3fb33

    SHA1

    7a76472a762c7cf68748c3b6b213ada71c5bba5a

    SHA256

    22e912427beff52645f1e2a19e361ecb03258a009a0d45e52fe20deefb224234

    SHA512

    22f49b6bcf5db183a0ac23e4b51631f8487d30f2508be9ac0408760f04224397d2851eaa3027b9f75607337a0395898ec2eed006ae4ac38dcdcc3f17ef5316a7

  • memory/3148-0-0x0000000000C94000-0x0000000000C95000-memory.dmp

    Filesize

    4KB

  • memory/3148-16-0x0000000000C94000-0x0000000000C95000-memory.dmp

    Filesize

    4KB

  • memory/4152-9-0x0000000007290000-0x00000000072A8000-memory.dmp

    Filesize

    96KB

  • memory/4152-17-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB

  • memory/4152-7-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB

  • memory/4152-10-0x000000000A070000-0x000000000A616000-memory.dmp

    Filesize

    5.6MB

  • memory/4152-12-0x000000000A730000-0x000000000A834000-memory.dmp

    Filesize

    1.0MB

  • memory/4152-13-0x000000000AC40000-0x000000000ACD2000-memory.dmp

    Filesize

    584KB

  • memory/4152-14-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB

  • memory/4152-15-0x000000000A6C0000-0x000000000A6CA000-memory.dmp

    Filesize

    40KB

  • memory/4152-6-0x0000000003450000-0x0000000003467000-memory.dmp

    Filesize

    92KB

  • memory/4152-8-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB

  • memory/4152-20-0x000000000B2B0000-0x000000000B34C000-memory.dmp

    Filesize

    624KB

  • memory/4152-21-0x000000000B6D0000-0x000000000B736000-memory.dmp

    Filesize

    408KB

  • memory/4152-23-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB

  • memory/4152-24-0x000000000C320000-0x000000000C396000-memory.dmp

    Filesize

    472KB

  • memory/4152-25-0x000000000C2A0000-0x000000000C2B0000-memory.dmp

    Filesize

    64KB

  • memory/4152-26-0x000000000C300000-0x000000000C31E000-memory.dmp

    Filesize

    120KB

  • memory/4152-27-0x000000000C0F0000-0x000000000C100000-memory.dmp

    Filesize

    64KB

  • memory/4152-28-0x0000000009F80000-0x0000000009FE6000-memory.dmp

    Filesize

    408KB

  • memory/4152-5-0x0000000000FD4000-0x0000000000FD5000-memory.dmp

    Filesize

    4KB

  • memory/4152-34-0x0000000000AF0000-0x0000000001317000-memory.dmp

    Filesize

    8.2MB