Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 20:11

General

  • Target

    1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe

  • Size

    870KB

  • MD5

    57ec9c5cdef08280c7f86f1267b2048b

  • SHA1

    8d5a31a5fb1924525fbbf5d07ae69eb7452c748c

  • SHA256

    1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f

  • SHA512

    da60c8f0408ad9c7afdb56835819a94d7684a95a2c075b7716479fa3e2f33f6b1ee898b36f29667244a07370e002e6788a6d322e11b137c66792a8e365ba43b3

  • SSDEEP

    24576:dK6DnB9VOFzl/MAZVsz/5/8yT/r7w1P+1PHnZXmO3w3:0SB9VO7UAL65/zrr2+VnZXb3w3

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Enero/Asgard

C2

2025blessed.dynuddns.com:7998

Mutex

VHKVSVS

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe
        "C:\Users\Admin\AppData\Local\Temp\1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe"
        2⤵
        • Checks computer location settings
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3436
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Existing Existing.cmd & Existing.cmd
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3480
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3572
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1468
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4000
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1008
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 81942
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4156
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Logo
            4⤵
            • System Location Discovery: System Language Discovery
            PID:672
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "how" Hop
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4604
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 81942\Jeremy.com + Prisoner + Customise + Indian + Worn + Symantec + Pas + Ira + Eddie + Thoroughly + Mu 81942\Jeremy.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3940
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Double + ..\Children + ..\Dietary V
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3540
          • C:\Users\Admin\AppData\Local\Temp\81942\Jeremy.com
            Jeremy.com V
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:692
            • C:\Users\Admin\AppData\Local\Temp\81942\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\81942\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4044
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2276
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Pride" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Pride" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeSyncr.url" & echo URL="C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeSyncr.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:1176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\81942\Jeremy.com

      Filesize

      111B

      MD5

      2e9d9385e0913e5d7fbf417cb40d14c3

      SHA1

      2efc9b2756b94ff423ff29ad5fc18810f6bdfbed

      SHA256

      96db313120b75b37b7fd38437fc5ad0b92139c80d3e469e428267618b5c0291d

      SHA512

      8b60abac748d197cdec39af4b877e85e2e97243891d2aa3181d6bc02b99853cc7711d9c50c0ae4c3cf455413d1d5d67d217f57756fea38abb053253ff042cdc6

    • C:\Users\Admin\AppData\Local\Temp\81942\Jeremy.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\81942\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\81942\V

      Filesize

      238KB

      MD5

      dfe5845ed6d7525506bf283dd41eb31b

      SHA1

      d7057324e012758bf77ba5a99f6d7610e5f61b0a

      SHA256

      ebed6a39fa2dc6ab0d3c16ce2a6d32867f3f0bac6fc115c9658b0bf7734a15ca

      SHA512

      722fb362879c311fceb9d82a223a1634262a0c07e549273be8db98c6b74a55b41c442dcc075d36ae7570d935c2fd041f1cebd6c1a6546e46eb14172612b83377

    • C:\Users\Admin\AppData\Local\Temp\Children

      Filesize

      78KB

      MD5

      7a307b392147e3a42156c109dd6f95af

      SHA1

      2dc90391b452676fcb3dd6a1a93236c6ff437e65

      SHA256

      829fe470333b27f61e3b991ee4b9cc9c621d1a2d01e11243da0f9649b09b772b

      SHA512

      d83dec2c68e3ce152469df436b82415a2cdb8c31623ad5c77e347c7f7256cf43d7923643e85d59455e53bec9249e77cd001c25402f09065c491208fc1885e247

    • C:\Users\Admin\AppData\Local\Temp\Customise

      Filesize

      69KB

      MD5

      7fae28daa099e53b37901f7818b45607

      SHA1

      fdf9fe995feaafe87d8c19004252bfb96c315f21

      SHA256

      2cff24927925efa2e9dae6294389cbd050bd434866ec31145812a52bf9815ed8

      SHA512

      fcba3b494f06f7f8789374895ed39d70f70a03a9fdbe62c567d391c38c77cc6cfaf94b3d493a7d74b7b318c85d919b31589460bd1622a9feeee0cc0062075637

    • C:\Users\Admin\AppData\Local\Temp\Dietary

      Filesize

      85KB

      MD5

      e5edbfefd62649eea7c05505ba15f6b9

      SHA1

      5f7348d4111d6f72bc5fa88bffa2015123938d41

      SHA256

      68fb4ba4ed7405ec4dffaf8f52f1050a7047f37239dc7ebad33481d96a2be23a

      SHA512

      185d266577a783844831808ff5f7be4ff71a9570a9cbb83b8be88a773e31c4d6dcc79e9b1e862549305bcd716b26c96b797cbb04ed874edf22eb86cef6c0af81

    • C:\Users\Admin\AppData\Local\Temp\Double

      Filesize

      75KB

      MD5

      01fdb3cf0bc77e1b9c1f0820b312a6cf

      SHA1

      be37af2e26b7c377705f5c99267c00cd53a1028a

      SHA256

      8159623dce9af834d46935defd3142705edf02c537904506f3b32b1521e55c34

      SHA512

      bd5f098912decf43c3bdf3d733de605d12120973693d996e0a17d413a9fe8791107aba76c431d8da30685d5a85447c1f9a478924d24ea28d93dd4ac6c2bb1c5e

    • C:\Users\Admin\AppData\Local\Temp\Eddie

      Filesize

      148KB

      MD5

      0a49d4a762efe5ac132fc441d811f26b

      SHA1

      30827f27dfd79cef1170c409527c073b1fa1ca3d

      SHA256

      ec4e7fc59b7366c1c6ddd9f4148ea8fba5630ee4a69acd892875f0a6a41016ae

      SHA512

      5f27d64764fa7a040761883fd86dda54b4c5d0071f9ad5aa1ccd4b6d277ab95f35370e23704a74469cb3c28dd57a47d27484a2a8b56085608a6eebb25a686c2f

    • C:\Users\Admin\AppData\Local\Temp\Existing

      Filesize

      25KB

      MD5

      1254760a9e0011ae9d4db930db1233af

      SHA1

      fc9c44cfc3c425f3f72ada3906f8a1b4a938171b

      SHA256

      fe07bc52517a65c8e721d35bd75f2409b0efb72f4bbf7f6077acb533be31d142

      SHA512

      cd5304873f4f259e64f39e5db7ee7bc6610c9b13998e29fe3eb6cc9a0add0789ad9ba725a9f5fe412bf37d01e9b80cc1ae0a9bee6eec6bc24772603e213a08d7

    • C:\Users\Admin\AppData\Local\Temp\Hop

      Filesize

      114B

      MD5

      bd69145e6a38745badb691e5b6b6e7d8

      SHA1

      20b15d536763fc483a09ca29d4f9983806f7addc

      SHA256

      4bac509be21aef59924a5813e4690f9be39e166dc390073ccb6159e7e761cd41

      SHA512

      f7aafe44dea25123f7719aeb3b97cce7e21f1427388de689da68e22c329e13c69a24e9496b3109d24f3b5853e9f6f98c883f7d172447c0a428bbd8f4526f143f

    • C:\Users\Admin\AppData\Local\Temp\Indian

      Filesize

      76KB

      MD5

      90b6ec610093e9439636eb759a776f2b

      SHA1

      5c5bdb5f3baaaeb9b7f0b72dc9f784ea12a3ff06

      SHA256

      433ceb5887d17c144443365e1b87e84c7e82fe8741a7454b027511247839e20d

      SHA512

      e4ad2dcf887ced4ba8f78affcd9386c1df4e346a19c9c4643de3631454c766a68b2d7e6aa475c4e8aa4a88523d6b1f678774b385629330d924cf7b02c1307c03

    • C:\Users\Admin\AppData\Local\Temp\Ira

      Filesize

      101KB

      MD5

      c428807aac1fa5b7e72ef448a51bb9ca

      SHA1

      a81649dc37883cc7b364d5a0bb796cce8f15fbb4

      SHA256

      a1a536bd17e6fd1f18f9e523a615fc4be5045c062b2da46cccb2dcde2436da0d

      SHA512

      30e0cbc62addb9cceaecbef6a9f8c476a9f393f43931eb266b306bf8c4c816a7857b40ee3ddd0fb0338455b9df585bbe106d20b2eb4aae5c25cb0c6008769928

    • C:\Users\Admin\AppData\Local\Temp\Logo

      Filesize

      476KB

      MD5

      853c32094275e1921fd75242f3885884

      SHA1

      b44896f58c76523c53dbe4c7e17a330a1096ab1d

      SHA256

      9b65d3f6b396ac2ee0175f3a21783f9d9b1763b33cc6ecb45ef0c0812b38e734

      SHA512

      24b12d23526894aaf8c4663386245866ee3c26153ac7ee442a87a4a54ec6b653b5baf6a6df6d9ffd3da60796d58427242e300243c14c0f4f81e582389f672ea9

    • C:\Users\Admin\AppData\Local\Temp\Mu

      Filesize

      4KB

      MD5

      ab3c9032e275f877d42d7abe9cde9c36

      SHA1

      20c81e4fa28f0775780bd6d400ea8a399daa960b

      SHA256

      6c10606e3ed2e9b50b67b803e2ae2e04f35ab8ba2978eb1fcf1ac48c6987f23b

      SHA512

      83dcf00d265ca7aba4bb62359c4b373629bdb97ca240102ff96864376a8913c0b49206673a05a9e3e1fecd6c5495647fb03f69f884b505b601f78ca1dbe5447d

    • C:\Users\Admin\AppData\Local\Temp\Pas

      Filesize

      99KB

      MD5

      e4eb9f8786813fd069cacb3c43503b45

      SHA1

      83747e41c9f32fd05ed32aa508820099e5226650

      SHA256

      f8219fbcd4b874a914ef5683ca3170cb7c192f8e2f0602c617d0d093bd3d697c

      SHA512

      a3d6a0b5fa8eb58951d01af4a60c886acb130f55c35206cb1a32a1c0f7e55c35bc2a730a5f58f1d4a48218e14aed9a2a7ce5189480809b3ad09a042274de4357

    • C:\Users\Admin\AppData\Local\Temp\Prisoner

      Filesize

      114KB

      MD5

      ae42011c44754f7ecfcf2a25a28454fd

      SHA1

      4d87b3a238e52b47b75f93624d0e47fe354159e1

      SHA256

      8f58e84735af822b0cf3a47f1aff56065977dd1340cc12d9b80f8d9a78b36b9f

      SHA512

      86b46040332733e7307e9bae15267a175a78f0b0ac20046b59ca75b5427a0f877cc4949764fb59bf47135c686f217fd08cda22ab8b7cd37a1c4f8415064e49bf

    • C:\Users\Admin\AppData\Local\Temp\Symantec

      Filesize

      133KB

      MD5

      c8819f611876d274ddd72aa9e2f585b9

      SHA1

      1e8fb8708caa55159d8df65c4e70b438052348b6

      SHA256

      f832a3a3e99f68a9c527f77de08e3d93cd29da415086bf1ca8a86b9011951a84

      SHA512

      a56eb901dbf81af03a0b6afd8b42253e275c807558181c032ca9fad9a1309cedd2d8c1188650c9cd7af554ff6acda233dafaa6a6893b1457f008cc73d33199a6

    • C:\Users\Admin\AppData\Local\Temp\Thoroughly

      Filesize

      104KB

      MD5

      ddcb80e86dc49fcfea1c5a21772c0e8c

      SHA1

      aa93416a4e1440ebc2921e2418db26c1e400ce65

      SHA256

      4269d9dac69509ef730770f57f304672d37e7b69ba95fc3212f45dcfe6e0319d

      SHA512

      1550fd14bed83f35cf8f9c0bc33f7044caa967bdf7dbecbef754a7955853546adc6ebee903009957a2c4fac34762db3f58f00907f9f0cded0016eeb15b854ce3

    • C:\Users\Admin\AppData\Local\Temp\Worn

      Filesize

      76KB

      MD5

      53a24f3424a908f8a52df5e7517b42a5

      SHA1

      e5760828ba68dd8e1117d76dfe6cbaaa9660baca

      SHA256

      13212964b2b1d6a8d80e2a7d3e0469bf001e33808074400c0e23917610a03ac3

      SHA512

      2b8cacb2d8404834afb740a48396278e650475771b180335a101a1daaacc5661549018f697d00448046d11ed378b6aadfc6282a1e23cccc7e267bbe756a89b2c

    • memory/4044-619-0x0000000000F30000-0x0000000000F42000-memory.dmp

      Filesize

      72KB