Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 13:06

General

  • Target

    random.exe

  • Size

    846KB

  • MD5

    c3d89e95bfb66f5127ac1f2f3e1bd665

  • SHA1

    bd79a4a17cc8ad63abdde20d9de02d55d54903f9

  • SHA256

    5d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b

  • SHA512

    d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111

  • SSDEEP

    24576:+VIFvGC3R+NVgcijiCnjWii1bAL3ztlmAQJut:Cg2VghqVRKz6AQwt

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

159.100.19.137:7707

Mutex

yBu0GW2G5zAc

Attributes
  • delay

    3

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:716
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1344
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 764661
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3168
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Fm
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3684
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Tunnel" Addresses
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2560
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4468
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1084
      • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com
        Macromedia.com F
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2144
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3856
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 15
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\764661\F

    Filesize

    230KB

    MD5

    47840b8162b9c6e7fe90ab0603d61f93

    SHA1

    2bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a

    SHA256

    5e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b

    SHA512

    9cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00

  • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com

    Filesize

    50KB

    MD5

    eaa9eac7b30831d5657349c116a0a4a2

    SHA1

    641e627a4c59abb2a3f1648e3cda6a8d9e1f4fcb

    SHA256

    c17f2fd61daf4ba0aa1e46fb3c1408d300d1bb46b02f7363452baad47d77f5d1

    SHA512

    61b39232328c7a9de8b83d35ce98ebc819d89043595afb9d36714a7c69966901d671af0b25d0a1d0becfefde5cdd59e2340e69cecbab1b0f686c61e35fd0c964

  • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\Addresses

    Filesize

    764B

    MD5

    41c199d56ee88613939ba36689b5272f

    SHA1

    c8ea27720461568200a6b1e65b26fcf34e0c40fa

    SHA256

    bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4

    SHA512

    66511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2

  • C:\Users\Admin\AppData\Local\Temp\Baghdad

    Filesize

    122KB

    MD5

    db32131c3970c57d0ad200b8c586b9c8

    SHA1

    adb5d20e012b668ad6cc77c166ade302607795dc

    SHA256

    edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5

    SHA512

    d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783

  • C:\Users\Admin\AppData\Local\Temp\Benz

    Filesize

    64KB

    MD5

    ec2a94df8c01a560e0604c640b26ccdd

    SHA1

    1ac09f3302b2df40302a050cee5ba5b119291215

    SHA256

    f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b

    SHA512

    bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec

  • C:\Users\Admin\AppData\Local\Temp\Complement

    Filesize

    59KB

    MD5

    dfb8e34f07291b05901c0d2a71e19442

    SHA1

    1b54535721482c0a3db1760541367a03deedc8c5

    SHA256

    0cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7

    SHA512

    09b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379

  • C:\Users\Admin\AppData\Local\Temp\Deluxe

    Filesize

    131KB

    MD5

    7aa824f055dc532c3e713734d5733577

    SHA1

    d354d68335a862ab729ffae878b6f8a3cc774d97

    SHA256

    6812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49

    SHA512

    e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c

  • C:\Users\Admin\AppData\Local\Temp\Derived

    Filesize

    30KB

    MD5

    f1548e92e0b2ffc07e003c7fae9ed9b9

    SHA1

    575ba8922ebbec527d150ec7c65992feace266db

    SHA256

    6b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5

    SHA512

    9f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470

  • C:\Users\Admin\AppData\Local\Temp\Drunk

    Filesize

    109KB

    MD5

    e31afb9405514fd5b7ca3a02c5697de3

    SHA1

    d0c67c8ac6be3ba39586c2364a80d82ea07e9898

    SHA256

    d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620

    SHA512

    0a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88

  • C:\Users\Admin\AppData\Local\Temp\Fm

    Filesize

    478KB

    MD5

    d772c64b8f02e063f7f8b1cea9509574

    SHA1

    2aa72a8f3e6474e0d9d23cbf88b72cf60415a82b

    SHA256

    5c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461

    SHA512

    6a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c

  • C:\Users\Admin\AppData\Local\Temp\Glasses

    Filesize

    120KB

    MD5

    62ee0376f7b66f93856090027793c5ae

    SHA1

    358d6750df4765fea465451f1024892c132a8b5e

    SHA256

    312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391

    SHA512

    74562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb

  • C:\Users\Admin\AppData\Local\Temp\Hills

    Filesize

    31KB

    MD5

    56f234f3854b87f2da60d4370c80f4ef

    SHA1

    7196616a8c40ffd498de9fc18ef0b4182a410c5b

    SHA256

    e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6

    SHA512

    a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176

  • C:\Users\Admin\AppData\Local\Temp\Pac

    Filesize

    87KB

    MD5

    44af3d9f2851fc9d3758542d4b83beb0

    SHA1

    00e5819a99f6bd7b8a91c56a20b4a04603ba1fdc

    SHA256

    6ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9

    SHA512

    633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f

  • C:\Users\Admin\AppData\Local\Temp\Plumbing

    Filesize

    62KB

    MD5

    d0a3f0692a9b5c96b6c1dfcb8192fdc6

    SHA1

    ca70a2d0ca34f6b06f4de3bd035e14183102a571

    SHA256

    bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72

    SHA512

    52290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095

  • C:\Users\Admin\AppData\Local\Temp\Racing

    Filesize

    62KB

    MD5

    354d8dade537bd6b724e2c0385910994

    SHA1

    3fbfaf7a3806875311b74f8152d803a6385b6956

    SHA256

    ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678

    SHA512

    1a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363

  • C:\Users\Admin\AppData\Local\Temp\Soundtrack

    Filesize

    78KB

    MD5

    43beeaedf4525e9ee2174012ee5ad60b

    SHA1

    67686a082061f90467fbd0536443175f5a2e77cc

    SHA256

    d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5

    SHA512

    9561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac

  • C:\Users\Admin\AppData\Local\Temp\Tender

    Filesize

    70KB

    MD5

    6f2d9e28fc8288ba6a6858607da20564

    SHA1

    195eee4913f5a2d43ef717d7e4afed13f28c9ab9

    SHA256

    78e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a

    SHA512

    fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95

  • C:\Users\Admin\AppData\Local\Temp\Totally

    Filesize

    50KB

    MD5

    c4af150b901a67bd95170ce3449b5c95

    SHA1

    95daab7704c8f186c963260596f274b0ae6f4fad

    SHA256

    53c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852

    SHA512

    30078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d

  • C:\Users\Admin\AppData\Local\Temp\Turner

    Filesize

    17KB

    MD5

    8302276f879565bfcf18de8278fa2df2

    SHA1

    5ade1c7516c3299b9a3572766a6512ef079f1aa1

    SHA256

    dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a

    SHA512

    515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade

  • C:\Users\Admin\AppData\Local\Temp\York

    Filesize

    79KB

    MD5

    4bfd15f3a354c7a93533787429a3a645

    SHA1

    0a114c1d163c1417b97f21e21b48778b87fd9ad3

    SHA256

    31d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632

    SHA512

    333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6

  • memory/3856-434-0x0000000000F60000-0x0000000000F72000-memory.dmp

    Filesize

    72KB

  • memory/3856-437-0x0000000005BC0000-0x0000000005C5C000-memory.dmp

    Filesize

    624KB

  • memory/3856-438-0x0000000006210000-0x00000000067B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3856-439-0x0000000005CD0000-0x0000000005D36000-memory.dmp

    Filesize

    408KB

  • memory/3856-440-0x0000000006DC0000-0x0000000006E36000-memory.dmp

    Filesize

    472KB

  • memory/3856-441-0x0000000006D40000-0x0000000006DA2000-memory.dmp

    Filesize

    392KB

  • memory/3856-442-0x0000000006E90000-0x0000000006EAE000-memory.dmp

    Filesize

    120KB