Analysis

  • max time kernel
    897s
  • max time network
    902s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 01:57

General

  • Target

    Windows Defenders.exe

  • Size

    82KB

  • MD5

    c83eee916e8a78f97511dd3bce5fd38c

  • SHA1

    0748ee6c65a2c401b8641d39cfff57e087f62154

  • SHA256

    c93d11c96d20e8b20cff7cd018440fa16f6601c047890c48c7e72cb5e0077e02

  • SHA512

    de60264ce73d09266727d5b8be3cda669b8e5f2ae2c68c09dfc9e6f1cfcfc512a3abba459cd55a63bf7f0fa83136bb6d511a16ff7553813a799446faa27f5b51

  • SSDEEP

    1536:gD9iBlgS19xE2VE8NVBxcEu6+rFanqNy7g4FY2qNlnw:gRU119rEMVAEX+4KoFRt

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

understanding-described.gl.at.ply.gg:3953

Attributes
  • delay

    1

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

understanding-described.gl.at.ply.gg:3953

Attributes
  • Install_directory

    %AppData%

  • install_file

    scvhost.exe

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 18 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Windows Defenders.exe
    "C:\Users\Admin\AppData\Local\Temp\Windows Defenders.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\AVDG AntiVirus.exe
      "C:\Users\Admin\AppData\Local\Temp\AVDG AntiVirus.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2264
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA180.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1188
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:384
    • C:\Users\Admin\AppData\Local\Temp\Avast AntiVirus.exe
      "C:\Users\Admin\AppData\Local\Temp\Avast AntiVirus.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5024
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1452
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4836
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2036
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3864
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:528
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2948
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3812
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2328
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2952
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4636
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4464
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2032
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:316
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3068
  • C:\Users\Admin\AppData\Roaming\svchost
    C:\Users\Admin\AppData\Roaming\svchost
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.log

    Filesize

    654B

    MD5

    2ff39f6c7249774be85fd60a8f9a245e

    SHA1

    684ff36b31aedc1e587c8496c02722c6698c1c4e

    SHA256

    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

    SHA512

    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

  • C:\Users\Admin\AppData\Local\Temp\AVDG AntiVirus.exe

    Filesize

    63KB

    MD5

    014c308c9e085a5204d4af8651710143

    SHA1

    31499e284c9f4d8ede48e88512a89f0c5f68f896

    SHA256

    0e8ac5b96d7b8a6bef8052eaeb57c732dee119379f659cbe7249543dd225f33d

    SHA512

    058f38c23926fcad0367850ce9f91d489111d0bcb06903b9246295e335b6aca2b20cb84065408863d8aab866dfc527742e93d264d6ffa64a86d60c21934fd22f

  • C:\Users\Admin\AppData\Local\Temp\Avast AntiVirus.exe

    Filesize

    67KB

    MD5

    e317647c04bfe18d171514c96d20a569

    SHA1

    4419cd2d51788d85ded8b8a110b186c10a09aefc

    SHA256

    f61f7e874d0aa814ab9799a363174a2f9ed4284a1537748c06d736070d2c20a6

    SHA512

    3da0e895f20188332db8c8a0562452d18e7676c4c461bab31e05c1d53202e38e0217804ec12d4d3aa68610e0573e8d54d16629d94dd7238f61925a2a3ca6319e

  • C:\Users\Admin\AppData\Local\Temp\tmpA180.tmp.bat

    Filesize

    151B

    MD5

    e3020834fb9f9eb0f48ef032eaa35f6c

    SHA1

    61c294efaaac804605fca1372a818217b85a8ebb

    SHA256

    5f3c9a7f166ef5eef92acbe25c028844468c93a7a2fe349d8b7f14141cefb9d4

    SHA512

    dfb421b8445b3a0140f28307c72d16c71e871772a62165d4d22df8b4562487076c81cf282ce1328cf4e84097ff28584a0e8d7cb732f4ea6f90c1b2e7bdcdfac3

  • memory/912-26-0x0000000000EB0000-0x0000000000EC8000-memory.dmp

    Filesize

    96KB

  • memory/912-28-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB

  • memory/912-40-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB

  • memory/1388-0-0x00007FFB5E6D3000-0x00007FFB5E6D5000-memory.dmp

    Filesize

    8KB

  • memory/1388-2-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB

  • memory/1388-36-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB

  • memory/1388-1-0x0000000000940000-0x000000000095A000-memory.dmp

    Filesize

    104KB

  • memory/2292-25-0x0000000000100000-0x0000000000116000-memory.dmp

    Filesize

    88KB

  • memory/2292-27-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-33-0x00007FFB5E6D0000-0x00007FFB5F191000-memory.dmp

    Filesize

    10.8MB