Overview
overview
10Static
static
3archivo.exe
windows7-x64
10archivo.exe
windows10-2004-x64
10mozglue.dll
windows7-x64
1mozglue.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1paillette.dmg
macos-10.15-amd64
vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
archivo.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
archivo.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
mozglue.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mozglue.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
msvcp140.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
paillette.dmg
Resource
macos-20241101-en
Behavioral task
behavioral8
Sample
vcruntime140.dll
Resource
win7-20250207-en
Behavioral task
behavioral9
Sample
vcruntime140.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
vcruntime140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
vcruntime140_1.dll
Resource
win10v2004-20250217-en
General
-
Target
archivo.exe
-
Size
1.3MB
-
MD5
240a6bf157e337dea52e7bf5a27f1cb8
-
SHA1
2773987e599d7b37e3848fadfd114b5cef35dc37
-
SHA256
06d02c153a476e7f2487b757c7c63685c3abd38b406acc598ad9fb76a4fb99c8
-
SHA512
c565881c347b9770cbbf183e50fa816a97a50601d4a537914c90d06e8eea790c8946062df1f86e0a764572c6afb0c2f01ee238ec2976aafc44f9bdfb25a583e8
-
SSDEEP
24576:YS+jvg5q5Dl0+FzYWWI5H4R09Y3h2OsDStIRWziIvH4Rh:YS+jvbDO6zDRUiah2OsDStI8JO
Malware Config
Extracted
asyncrat
AWS | 3Losh
Default
llechematerna02.kozow.com:7575
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1488 set thread context of 3020 1488 archivo.exe 29 PID 3020 set thread context of 2884 3020 cmd.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1488 archivo.exe 1488 archivo.exe 3020 cmd.exe 3020 cmd.exe 2884 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1488 archivo.exe 3020 cmd.exe 3020 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2884 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2884 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1488 wrote to memory of 3020 1488 archivo.exe 29 PID 1488 wrote to memory of 3020 1488 archivo.exe 29 PID 1488 wrote to memory of 3020 1488 archivo.exe 29 PID 1488 wrote to memory of 3020 1488 archivo.exe 29 PID 1488 wrote to memory of 3020 1488 archivo.exe 29 PID 3020 wrote to memory of 2884 3020 cmd.exe 31 PID 3020 wrote to memory of 2884 3020 cmd.exe 31 PID 3020 wrote to memory of 2884 3020 cmd.exe 31 PID 3020 wrote to memory of 2884 3020 cmd.exe 31 PID 3020 wrote to memory of 2884 3020 cmd.exe 31 PID 3020 wrote to memory of 2884 3020 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\archivo.exe"C:\Users\Admin\AppData\Local\Temp\archivo.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779KB
MD57c909442d4bfdc35e9d2f9ab9f5b71d8
SHA1dd0ec117e9b4767705d35df99aaa498994ee25af
SHA25608b9a6f90040d327ed56aa230c7075b2ab9539a0fd45172aa2edb69e730178c5
SHA512d051401f2b560d6837057efdc6d112233c853067cfb2e51368f740b078a5944b48bd6b00b709c773eb9d0181149eaa519ebbd8d78c5b58c22f85a1912cab5748