Analysis

  • max time kernel
    549s
  • max time network
    559s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/01/2025, 23:55

General

  • Target

    Client.exe

  • Size

    47KB

  • MD5

    d5c9a99faec2ef972d47aa0a15cb4388

  • SHA1

    8832d330806ca587fd9d0da341a530080ff98277

  • SHA256

    ae3f87d64dc6c41c9a80287a3d58769b72730402d24e7389f1cdb8b836ebeae9

  • SHA512

    83c2524d2947dbcd979d7d3e0b1b1b8b6d043668e8d88785bddaa3daab8263c82dbd62dbbd9c3a4ba9a9f72b03b8186ffbc7c5237dfc021eb9874070b074ba60

  • SSDEEP

    768:p9umxLiIL1CaS+DiMtelDSN+iV08YbygekUHuZtbIr/IvEgK/JnZVc6KN:p9uAPWMtKDs4zb1lUuZta/InkJnZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

127.0.0.1:8085

127.0.0.1:65366

record-lopez.gl.at.ply.gg:8848

record-lopez.gl.at.ply.gg:8085

record-lopez.gl.at.ply.gg:65366

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5104
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    b66799d715b113faf28da5aaba5528ef

    SHA1

    1b20576808d17c24f7abf2c49a7facfbc1480da4

    SHA256

    bb7ed85e7a1833e5a31d62882937ee6b094f2421b9d1c8d9b6e64b9845b29868

    SHA512

    93d4708a2f4bb3ca7b5bcb0f3dc13eb5e93bfa5e485845822d67770e4c0217797f330ab9395598b1d7452cc8191e4d3848a1b268a6cd1b7a5001266ce53794d6

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    77a8b2c86dd26c214bc11c989789b62d

    SHA1

    8b0f2d9d0ded2d7f9bff8aed6aefd6b3fdd1a499

    SHA256

    e288c02cbba393c9703519e660bf8709331f11978c6d994ea2a1346eef462cb8

    SHA512

    c287e3ae580343c43a5354347ca5444f54840fba127a2b1edc897b1dfea286fa37b5808f6e89f535c4022db8b3f29448aa4cc2f41ab0f308eec525a99fac4e5e

  • C:\Users\Admin\AppData\Local\Temp\tmpC1DA.tmp.jpg

    Filesize

    1.1MB

    MD5

    daa756fda35cedf3d0f1318cb43edab6

    SHA1

    4ba5c772c6d096b4ce2a2146ae90b1aa5017dbca

    SHA256

    435d73ec39ef37851b96b0d896cff604abaec7abb8a03a61c8f698c9e2ad71e9

    SHA512

    86f2326f5e63b10ffd1d30d347d370f02009f8bba9f517b4b21cdfc8e68c253d34921d097682b7cea1ad4cb439fc7fa9cfad815c2b4873486d00069009e89514

  • memory/5104-6-0x00007FFABD6D0000-0x00007FFABE192000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-0-0x00007FFABD6D3000-0x00007FFABD6D5000-memory.dmp

    Filesize

    8KB

  • memory/5104-8-0x000000001CAA0000-0x000000001CB08000-memory.dmp

    Filesize

    416KB

  • memory/5104-7-0x000000001CB20000-0x000000001CB96000-memory.dmp

    Filesize

    472KB

  • memory/5104-9-0x000000001B170000-0x000000001B18E000-memory.dmp

    Filesize

    120KB

  • memory/5104-10-0x00007FFABD6D0000-0x00007FFABE192000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-11-0x00007FFABD6D0000-0x00007FFABE192000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-12-0x00007FFABD6D0000-0x00007FFABE192000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-3-0x00007FFABD6D3000-0x00007FFABD6D5000-memory.dmp

    Filesize

    8KB

  • memory/5104-2-0x00007FFABD6D0000-0x00007FFABE192000-memory.dmp

    Filesize

    10.8MB

  • memory/5104-32-0x0000000000B60000-0x0000000000B6E000-memory.dmp

    Filesize

    56KB

  • memory/5104-1-0x0000000000460000-0x0000000000472000-memory.dmp

    Filesize

    72KB

  • memory/5104-39-0x0000000000AF0000-0x0000000000AFE000-memory.dmp

    Filesize

    56KB