Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 12:53

General

  • Target

    random.exe

  • Size

    846KB

  • MD5

    c3d89e95bfb66f5127ac1f2f3e1bd665

  • SHA1

    bd79a4a17cc8ad63abdde20d9de02d55d54903f9

  • SHA256

    5d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b

  • SHA512

    d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111

  • SSDEEP

    24576:+VIFvGC3R+NVgcijiCnjWii1bAL3ztlmAQJut:Cg2VghqVRKz6AQwt

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

159.100.19.137:7707

Mutex

yBu0GW2G5zAc

Attributes
  • delay

    3

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2012
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1488
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4592
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 764661
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2768
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Fm
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4356
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Tunnel" Addresses
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3548
      • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com
        Macromedia.com F
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:3864
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4212
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            5⤵
              PID:3668
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
              5⤵
                PID:4080
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                5⤵
                  PID:4524
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  5⤵
                    PID:552
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    5⤵
                      PID:604
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      5⤵
                        PID:2484
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        5⤵
                          PID:3496
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:3176
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 2416
                            6⤵
                            • Program crash
                            PID:4656
                    • C:\Windows\SysWOW64\choice.exe
                      choice /d y /t 15
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4312
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3176 -ip 3176
                  1⤵
                    PID:4440

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\764661\F

                    Filesize

                    230KB

                    MD5

                    47840b8162b9c6e7fe90ab0603d61f93

                    SHA1

                    2bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a

                    SHA256

                    5e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b

                    SHA512

                    9cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00

                  • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com

                    Filesize

                    50KB

                    MD5

                    eaa9eac7b30831d5657349c116a0a4a2

                    SHA1

                    641e627a4c59abb2a3f1648e3cda6a8d9e1f4fcb

                    SHA256

                    c17f2fd61daf4ba0aa1e46fb3c1408d300d1bb46b02f7363452baad47d77f5d1

                    SHA512

                    61b39232328c7a9de8b83d35ce98ebc819d89043595afb9d36714a7c69966901d671af0b25d0a1d0becfefde5cdd59e2340e69cecbab1b0f686c61e35fd0c964

                  • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com

                    Filesize

                    925KB

                    MD5

                    62d09f076e6e0240548c2f837536a46a

                    SHA1

                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                    SHA256

                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                    SHA512

                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                  • C:\Users\Admin\AppData\Local\Temp\Addresses

                    Filesize

                    764B

                    MD5

                    41c199d56ee88613939ba36689b5272f

                    SHA1

                    c8ea27720461568200a6b1e65b26fcf34e0c40fa

                    SHA256

                    bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4

                    SHA512

                    66511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2

                  • C:\Users\Admin\AppData\Local\Temp\Baghdad

                    Filesize

                    122KB

                    MD5

                    db32131c3970c57d0ad200b8c586b9c8

                    SHA1

                    adb5d20e012b668ad6cc77c166ade302607795dc

                    SHA256

                    edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5

                    SHA512

                    d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783

                  • C:\Users\Admin\AppData\Local\Temp\Benz

                    Filesize

                    64KB

                    MD5

                    ec2a94df8c01a560e0604c640b26ccdd

                    SHA1

                    1ac09f3302b2df40302a050cee5ba5b119291215

                    SHA256

                    f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b

                    SHA512

                    bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec

                  • C:\Users\Admin\AppData\Local\Temp\Complement

                    Filesize

                    59KB

                    MD5

                    dfb8e34f07291b05901c0d2a71e19442

                    SHA1

                    1b54535721482c0a3db1760541367a03deedc8c5

                    SHA256

                    0cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7

                    SHA512

                    09b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379

                  • C:\Users\Admin\AppData\Local\Temp\Deluxe

                    Filesize

                    131KB

                    MD5

                    7aa824f055dc532c3e713734d5733577

                    SHA1

                    d354d68335a862ab729ffae878b6f8a3cc774d97

                    SHA256

                    6812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49

                    SHA512

                    e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c

                  • C:\Users\Admin\AppData\Local\Temp\Derived

                    Filesize

                    30KB

                    MD5

                    f1548e92e0b2ffc07e003c7fae9ed9b9

                    SHA1

                    575ba8922ebbec527d150ec7c65992feace266db

                    SHA256

                    6b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5

                    SHA512

                    9f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470

                  • C:\Users\Admin\AppData\Local\Temp\Drunk

                    Filesize

                    109KB

                    MD5

                    e31afb9405514fd5b7ca3a02c5697de3

                    SHA1

                    d0c67c8ac6be3ba39586c2364a80d82ea07e9898

                    SHA256

                    d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620

                    SHA512

                    0a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88

                  • C:\Users\Admin\AppData\Local\Temp\Fm

                    Filesize

                    478KB

                    MD5

                    d772c64b8f02e063f7f8b1cea9509574

                    SHA1

                    2aa72a8f3e6474e0d9d23cbf88b72cf60415a82b

                    SHA256

                    5c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461

                    SHA512

                    6a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c

                  • C:\Users\Admin\AppData\Local\Temp\Glasses

                    Filesize

                    120KB

                    MD5

                    62ee0376f7b66f93856090027793c5ae

                    SHA1

                    358d6750df4765fea465451f1024892c132a8b5e

                    SHA256

                    312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391

                    SHA512

                    74562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb

                  • C:\Users\Admin\AppData\Local\Temp\Hills

                    Filesize

                    31KB

                    MD5

                    56f234f3854b87f2da60d4370c80f4ef

                    SHA1

                    7196616a8c40ffd498de9fc18ef0b4182a410c5b

                    SHA256

                    e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6

                    SHA512

                    a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176

                  • C:\Users\Admin\AppData\Local\Temp\Pac

                    Filesize

                    87KB

                    MD5

                    44af3d9f2851fc9d3758542d4b83beb0

                    SHA1

                    00e5819a99f6bd7b8a91c56a20b4a04603ba1fdc

                    SHA256

                    6ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9

                    SHA512

                    633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f

                  • C:\Users\Admin\AppData\Local\Temp\Plumbing

                    Filesize

                    62KB

                    MD5

                    d0a3f0692a9b5c96b6c1dfcb8192fdc6

                    SHA1

                    ca70a2d0ca34f6b06f4de3bd035e14183102a571

                    SHA256

                    bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72

                    SHA512

                    52290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095

                  • C:\Users\Admin\AppData\Local\Temp\Racing

                    Filesize

                    62KB

                    MD5

                    354d8dade537bd6b724e2c0385910994

                    SHA1

                    3fbfaf7a3806875311b74f8152d803a6385b6956

                    SHA256

                    ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678

                    SHA512

                    1a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363

                  • C:\Users\Admin\AppData\Local\Temp\Soundtrack

                    Filesize

                    78KB

                    MD5

                    43beeaedf4525e9ee2174012ee5ad60b

                    SHA1

                    67686a082061f90467fbd0536443175f5a2e77cc

                    SHA256

                    d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5

                    SHA512

                    9561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac

                  • C:\Users\Admin\AppData\Local\Temp\Tender

                    Filesize

                    70KB

                    MD5

                    6f2d9e28fc8288ba6a6858607da20564

                    SHA1

                    195eee4913f5a2d43ef717d7e4afed13f28c9ab9

                    SHA256

                    78e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a

                    SHA512

                    fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95

                  • C:\Users\Admin\AppData\Local\Temp\Totally

                    Filesize

                    50KB

                    MD5

                    c4af150b901a67bd95170ce3449b5c95

                    SHA1

                    95daab7704c8f186c963260596f274b0ae6f4fad

                    SHA256

                    53c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852

                    SHA512

                    30078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d

                  • C:\Users\Admin\AppData\Local\Temp\Turner

                    Filesize

                    17KB

                    MD5

                    8302276f879565bfcf18de8278fa2df2

                    SHA1

                    5ade1c7516c3299b9a3572766a6512ef079f1aa1

                    SHA256

                    dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a

                    SHA512

                    515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade

                  • C:\Users\Admin\AppData\Local\Temp\York

                    Filesize

                    79KB

                    MD5

                    4bfd15f3a354c7a93533787429a3a645

                    SHA1

                    0a114c1d163c1417b97f21e21b48778b87fd9ad3

                    SHA256

                    31d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632

                    SHA512

                    333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6

                  • memory/3176-445-0x0000000005A20000-0x0000000005AB2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3176-444-0x0000000000400000-0x0000000000704000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/3176-472-0x0000000007A10000-0x0000000007A5C000-memory.dmp

                    Filesize

                    304KB

                  • memory/3176-448-0x0000000006D60000-0x00000000070B4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3176-447-0x0000000006D30000-0x0000000006D52000-memory.dmp

                    Filesize

                    136KB

                  • memory/3176-446-0x00000000059E0000-0x00000000059EA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4212-440-0x0000000006840000-0x00000000068B6000-memory.dmp

                    Filesize

                    472KB

                  • memory/4212-443-0x0000000006300000-0x0000000006362000-memory.dmp

                    Filesize

                    392KB

                  • memory/4212-442-0x0000000006920000-0x000000000693E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4212-434-0x00000000007B0000-0x00000000007C2000-memory.dmp

                    Filesize

                    72KB

                  • memory/4212-441-0x00000000067C0000-0x0000000006822000-memory.dmp

                    Filesize

                    392KB

                  • memory/4212-437-0x0000000005700000-0x000000000579C000-memory.dmp

                    Filesize

                    624KB

                  • memory/4212-439-0x0000000005810000-0x0000000005876000-memory.dmp

                    Filesize

                    408KB

                  • memory/4212-438-0x0000000005D50000-0x00000000062F4000-memory.dmp

                    Filesize

                    5.6MB