Analysis

  • max time kernel
    139s
  • max time network
    293s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2025, 16:08

General

  • Target

    Rechnung 57698020 nicht korrekt.pdf/Rechnung 57698020 nicht korrekt.pdf_____________________________.exe

  • Size

    1.0MB

  • MD5

    bb8693c961ba55d38f76a77494a37dd0

  • SHA1

    e656b1f51305aeb01fc5ae141e8db999c7a15496

  • SHA256

    fce0542aa373126205c1c38161dd9adefc05844e616b9bd0fa49d595e634c407

  • SHA512

    00813fd03ead3448adb7c2e0f4fe543229188d09a98199cbdde0d630fb5983de94b75d4182ea0bc6bdfc247e5d13f56e2efdba1ae39ce58ebfd41ce6b7052d9c

  • SSDEEP

    24576:+u6J33O0c+JY5UZ+XC0kGso6Fauk1Yi8fMM6WY:Qu0c++OCvkGs9Fa91Yii5Y

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

5.253.247.7:4114

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe
    "C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\AppData\Local\Idonna\incalculability.exe
      "C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Idonna\incalculability.exe

    Filesize

    1.0MB

    MD5

    bb8693c961ba55d38f76a77494a37dd0

    SHA1

    e656b1f51305aeb01fc5ae141e8db999c7a15496

    SHA256

    fce0542aa373126205c1c38161dd9adefc05844e616b9bd0fa49d595e634c407

    SHA512

    00813fd03ead3448adb7c2e0f4fe543229188d09a98199cbdde0d630fb5983de94b75d4182ea0bc6bdfc247e5d13f56e2efdba1ae39ce58ebfd41ce6b7052d9c

  • C:\Users\Admin\AppData\Local\Temp\hurtling

    Filesize

    63KB

    MD5

    b959eb57f0d08151889bc052328afa4c

    SHA1

    8e5b9c3e3aee4ff2613a811fdb5e810532b3fb12

    SHA256

    8b3e0024e388fa04bf6ed06d4d4e8c990e6849d9ba9ddd1ae26efbe77c0b55db

    SHA512

    a6780a7aa945ea0e09bb1de39978a585711288f0611057d52be6e360a2917e4429be08e668fe7fc64430fb3980cf630e2fd66b1a5f04aa6783c597ce498036a4

  • C:\Users\Admin\AppData\Local\Temp\recomplete

    Filesize

    29KB

    MD5

    a8d81d9e6fe6dc09c4aa663ae5a000d5

    SHA1

    f645dbb701ae63c5728642f5e0ec6534e3d47dee

    SHA256

    fee6dc1fade4be8273223de5ba6cae4ab2b5e282eb8d09f23fcd59b5d94cdd2b

    SHA512

    5a6eab1a0a7f280458fa8a79630505bff49853800895123d98d1676f723b8a7a4e0c0e93f79c4c3a78f1ca06c01177d2dba43b098d82d5919074cce654e0de11

  • memory/3340-10-0x00000000011D0000-0x00000000011D4000-memory.dmp

    Filesize

    16KB

  • memory/4516-30-0x0000000074CA0000-0x0000000075450000-memory.dmp

    Filesize

    7.7MB

  • memory/4516-29-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

    Filesize

    4KB

  • memory/4516-28-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/4516-31-0x0000000074CA0000-0x0000000075450000-memory.dmp

    Filesize

    7.7MB

  • memory/4516-34-0x0000000005CB0000-0x0000000005D4C000-memory.dmp

    Filesize

    624KB

  • memory/4516-35-0x0000000006300000-0x00000000068A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4516-36-0x0000000005DC0000-0x0000000005E26000-memory.dmp

    Filesize

    408KB

  • memory/4516-37-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

    Filesize

    4KB

  • memory/4516-38-0x0000000074CA0000-0x0000000075450000-memory.dmp

    Filesize

    7.7MB

  • memory/4516-39-0x0000000074CA0000-0x0000000075450000-memory.dmp

    Filesize

    7.7MB