Overview
overview
10Static
static
3archivo.exe
windows7-x64
10archivo.exe
windows10-2004-x64
10mozglue.dll
windows7-x64
1mozglue.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1paillette.dmg
macos-10.15-amd64
vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
archivo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
archivo.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
mozglue.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
mozglue.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
msvcp140.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
msvcp140.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
paillette.dmg
Resource
macos-20241106-en
Behavioral task
behavioral8
Sample
vcruntime140.dll
Resource
win7-20250207-en
Behavioral task
behavioral9
Sample
vcruntime140.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
vcruntime140_1.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
vcruntime140_1.dll
Resource
win10v2004-20250217-en
General
-
Target
archivo.exe
-
Size
1.3MB
-
MD5
240a6bf157e337dea52e7bf5a27f1cb8
-
SHA1
2773987e599d7b37e3848fadfd114b5cef35dc37
-
SHA256
06d02c153a476e7f2487b757c7c63685c3abd38b406acc598ad9fb76a4fb99c8
-
SHA512
c565881c347b9770cbbf183e50fa816a97a50601d4a537914c90d06e8eea790c8946062df1f86e0a764572c6afb0c2f01ee238ec2976aafc44f9bdfb25a583e8
-
SSDEEP
24576:YS+jvg5q5Dl0+FzYWWI5H4R09Y3h2OsDStIRWziIvH4Rh:YS+jvbDO6zDRUiah2OsDStI8JO
Malware Config
Extracted
asyncrat
AWS | 3Losh
Default
llechematerna02.kozow.com:7575
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2068 set thread context of 2800 2068 archivo.exe 30 PID 2800 set thread context of 2592 2800 cmd.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2068 archivo.exe 2068 archivo.exe 2800 cmd.exe 2800 cmd.exe 2592 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2068 archivo.exe 2800 cmd.exe 2800 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2592 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2800 2068 archivo.exe 30 PID 2068 wrote to memory of 2800 2068 archivo.exe 30 PID 2068 wrote to memory of 2800 2068 archivo.exe 30 PID 2068 wrote to memory of 2800 2068 archivo.exe 30 PID 2068 wrote to memory of 2800 2068 archivo.exe 30 PID 2800 wrote to memory of 2592 2800 cmd.exe 32 PID 2800 wrote to memory of 2592 2800 cmd.exe 32 PID 2800 wrote to memory of 2592 2800 cmd.exe 32 PID 2800 wrote to memory of 2592 2800 cmd.exe 32 PID 2800 wrote to memory of 2592 2800 cmd.exe 32 PID 2800 wrote to memory of 2592 2800 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\archivo.exe"C:\Users\Admin\AppData\Local\Temp\archivo.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779KB
MD52838c8ca6e8d3ee94d195a5d2088cc48
SHA18cfe6f4253406e922aec73cf2aeda7ee5e7b1209
SHA256ff763744ae1f5ece9c1401b6e29b4a863dcf9a4dedb2166b5135e7c7f413dcc4
SHA512f9dad71af4fa2ee4686ccc0630faef2c5cfb0881c4abccf7e0851c064f4445d0633f469d2e7991b4f5fb7c7e6bff2988f40a817ac33aa375915827cfaec10311