Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 21:21

General

  • Target

    62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe

  • Size

    949KB

  • MD5

    5f41899fe8f7801b20885898e0f4c05a

  • SHA1

    b696ed30844f88392897eb9c0d47cfabcf9ad5f3

  • SHA256

    62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed

  • SHA512

    c9490f3359df8be70a21e88cc940c3486391fbc089cb026d5570cc235133f63dd6e8dfc6cce8db9dd11cb64d2a5be6d0329abb15713f5bfb37d9c362f9e3220a

  • SSDEEP

    24576:vnvJUgT/3hRWpul04R3qO/hCwZWHGIEIPURoWuVT:vvygTffWMlH6otkGI9sLuF

Malware Config

Extracted

Family

asyncrat

Version

Esco Private rat

Botnet

Default

C2

196.251.88.53:4449

Mutex

voodynqjploelta

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe
    "C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\is-KBI41.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KBI41.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp" /SL5="$70056,721126,73216,C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe
        "C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe" /VERYSILENT
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4200
        • C:\Users\Admin\AppData\Local\Temp\is-RC35S.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-RC35S.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp" /SL5="$70252,721126,73216,C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\netapi32_2.ocx"
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3600
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:672
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
              "PowerShell.exe" -NoProfile -NonInteractive -Command -
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4436
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4224
  • C:\Windows\system32\regsvr32.EXE
    C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Windows\SysWOW64\regsvr32.exe
      /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4504
  • C:\Windows\system32\regsvr32.EXE
    C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\SysWOW64\regsvr32.exe
      /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PowerShell.exe.log

    Filesize

    2KB

    MD5

    9751fcb3d8dc82d33d50eebe53abe314

    SHA1

    7a680212700a5d9f3ca67c81e0e243834387c20c

    SHA256

    ad2e3139aa438f799c4a876ca3e64af772b8a5786149925a08389723e42394d7

    SHA512

    54907cc18684ff892b737496183ca60c788d8f5d76365586954f269dbd50ac1b9cd48c7c50bd6ca02009e6020fd77a8282c9a7ad6b824a20585c505bd7e13709

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    29524032581a28ef24ce3e9f8c70f16a

    SHA1

    ef110e9d685290633063ca0734a7305b74647bbb

    SHA256

    e45c5e07fbc74e7ba26bef4eaeb81c93c3ced95cdea0049264714b6518892b1c

    SHA512

    8f497dda984c5d00946c6e926a0975a75baa1ceb30ab84ba171a9c0a551ee74e7245ee0ebada5804155702ab0028b88e9b2bd04f0ee3bc5312680afb6497bb71

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    21KB

    MD5

    655d256be0c8c909aeeeef229a90342c

    SHA1

    590e13ba74deaf89b90efbb12c23c18616e099d6

    SHA256

    e6c1786bf3a2f990ed96c5b121bab49af3e53ebee38a4059a71b0275a09c35c9

    SHA512

    cc468a4b4106659c60ce9cbe7984c048ff6596132088c876f8808ea8070d65a2a200965297e5e68bcac551c480266654d4cc8ccb006a48730e2579a7c0035fda

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    f2d5221eb1b252566ad40d19099e5651

    SHA1

    084b9169b87e4e2a1dc7236c0d2af69e15624f29

    SHA256

    d4084f1f9b2f9e8827db035f0256687db68a50bd2514a14bb02c9df94804bfed

    SHA512

    3c920afb08dc72518884f8c6fa576eca40882f688c2cdee5a0df71fa620aa04858c26d1b77cc39e49ab449c563d4cc24ad32b6830ad959626d0c437374b8604d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    55d68a7b651b7ee1434f2ce741ccccdc

    SHA1

    a7b5d8943e48cfcfb52d2a8ffe08cba569d24eb3

    SHA256

    5304df35895252e3d30e1c0d8e0c186fb49fb6795bd0ca136500bd4d0304fa72

    SHA512

    42383aa0723257114081ad3f3bd01cac3d743110dbb3c80ee0ed06f1b6090ceb20d62862ec45c21533ae7025be33c66f0726a49f2610952ecba683ed10ded7d0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yhcsdnwp.k50.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\is-06IF1.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • C:\Users\Admin\AppData\Local\Temp\is-KBI41.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp

    Filesize

    711KB

    MD5

    9917f679a0135245a5cc6b1aadcb3a6c

    SHA1

    7aab67a56fd3e10fd070e29d2998af2162c0a204

    SHA256

    a0090b3a687e7d0a6d6b6918bcbb798ebecb184cba8d3eb5fe4345ec9aba9243

    SHA512

    87194d9f3c97b48a297faef76e3a308de6b454d10a5b50adeb22336982ca5bd5ba3a1cacb39cfbaf78a3befbc37967eb89a7c84cfdd53054204647dffd5b35cd

  • C:\Users\Admin\AppData\Local\Temp\is-O0RD2.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • C:\Users\Admin\AppData\Roaming\netapi32_2.ocx

    Filesize

    1.4MB

    MD5

    c87013ae4715ff280d9f8d2fe749cdba

    SHA1

    5e7e78ca3d2f799cb9befb0a2f13a1d5636a04af

    SHA256

    fef9803aa84de828968ffcaebab6050c109147d96420a753b9a6b5d1968ed4bf

    SHA512

    af9292f763dcd829d3d3d5aa1cd38bae54c2ceb92572f231ede1793e303173f3ba7eef17fe167a0fdc7dd25a9869bd18da4d9e3cb5c75573f1edb6ff1f2e5aaf

  • memory/672-91-0x0000000007500000-0x000000000751A000-memory.dmp

    Filesize

    104KB

  • memory/672-75-0x00000000061C0000-0x00000000061DE000-memory.dmp

    Filesize

    120KB

  • memory/672-94-0x0000000007700000-0x0000000007711000-memory.dmp

    Filesize

    68KB

  • memory/672-93-0x0000000007780000-0x0000000007816000-memory.dmp

    Filesize

    600KB

  • memory/672-60-0x0000000002BD0000-0x0000000002C06000-memory.dmp

    Filesize

    216KB

  • memory/672-61-0x0000000005460000-0x0000000005A88000-memory.dmp

    Filesize

    6.2MB

  • memory/672-62-0x0000000005230000-0x0000000005252000-memory.dmp

    Filesize

    136KB

  • memory/672-63-0x0000000005B00000-0x0000000005B66000-memory.dmp

    Filesize

    408KB

  • memory/672-64-0x0000000005B70000-0x0000000005BD6000-memory.dmp

    Filesize

    408KB

  • memory/672-92-0x0000000007550000-0x000000000755A000-memory.dmp

    Filesize

    40KB

  • memory/672-74-0x0000000005DD0000-0x0000000006124000-memory.dmp

    Filesize

    3.3MB

  • memory/672-90-0x0000000007B40000-0x00000000081BA000-memory.dmp

    Filesize

    6.5MB

  • memory/672-76-0x0000000006200000-0x000000000624C000-memory.dmp

    Filesize

    304KB

  • memory/672-77-0x0000000007180000-0x00000000071B2000-memory.dmp

    Filesize

    200KB

  • memory/672-78-0x00000000754D0000-0x000000007551C000-memory.dmp

    Filesize

    304KB

  • memory/672-88-0x00000000067A0000-0x00000000067BE000-memory.dmp

    Filesize

    120KB

  • memory/672-89-0x00000000071C0000-0x0000000007263000-memory.dmp

    Filesize

    652KB

  • memory/852-213-0x00000000757F0000-0x0000000075967000-memory.dmp

    Filesize

    1.5MB

  • memory/2992-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2992-29-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2992-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/3184-12-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3184-28-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3600-152-0x00000000757F0000-0x0000000075967000-memory.dmp

    Filesize

    1.5MB

  • memory/3600-150-0x00000000065E0000-0x000000000667C000-memory.dmp

    Filesize

    624KB

  • memory/3600-147-0x0000000005930000-0x000000000593A000-memory.dmp

    Filesize

    40KB

  • memory/3600-146-0x0000000005980000-0x0000000005A12000-memory.dmp

    Filesize

    584KB

  • memory/3600-144-0x0000000005D90000-0x0000000006334000-memory.dmp

    Filesize

    5.6MB

  • memory/3600-142-0x00000000757F0000-0x0000000075967000-memory.dmp

    Filesize

    1.5MB

  • memory/3600-143-0x0000000003290000-0x00000000032A8000-memory.dmp

    Filesize

    96KB

  • memory/4200-23-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4200-25-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4200-59-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4224-131-0x00000000754D0000-0x000000007551C000-memory.dmp

    Filesize

    304KB

  • memory/4368-183-0x00000000757F0000-0x0000000075967000-memory.dmp

    Filesize

    1.5MB

  • memory/4436-109-0x00000000754D0000-0x000000007551C000-memory.dmp

    Filesize

    304KB

  • memory/4436-98-0x0000000005D60000-0x00000000060B4000-memory.dmp

    Filesize

    3.3MB

  • memory/4504-180-0x0000000007180000-0x0000000007223000-memory.dmp

    Filesize

    652KB

  • memory/4504-170-0x0000000070670000-0x00000000706BC000-memory.dmp

    Filesize

    304KB

  • memory/4504-169-0x0000000005F00000-0x0000000005F4C000-memory.dmp

    Filesize

    304KB

  • memory/4504-181-0x0000000007430000-0x0000000007441000-memory.dmp

    Filesize

    68KB

  • memory/4504-163-0x0000000005790000-0x0000000005AE4000-memory.dmp

    Filesize

    3.3MB

  • memory/4648-55-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/4648-36-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/4820-200-0x0000000005980000-0x0000000005CD4000-memory.dmp

    Filesize

    3.3MB

  • memory/4820-202-0x0000000070670000-0x00000000706BC000-memory.dmp

    Filesize

    304KB