Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 03:15

General

  • Target

    62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe

  • Size

    949KB

  • MD5

    5f41899fe8f7801b20885898e0f4c05a

  • SHA1

    b696ed30844f88392897eb9c0d47cfabcf9ad5f3

  • SHA256

    62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed

  • SHA512

    c9490f3359df8be70a21e88cc940c3486391fbc089cb026d5570cc235133f63dd6e8dfc6cce8db9dd11cb64d2a5be6d0329abb15713f5bfb37d9c362f9e3220a

  • SSDEEP

    24576:vnvJUgT/3hRWpul04R3qO/hCwZWHGIEIPURoWuVT:vvygTffWMlH6otkGI9sLuF

Malware Config

Extracted

Family

asyncrat

Version

Esco Private rat

Botnet

Default

C2

196.251.88.53:4449

Mutex

voodynqjploelta

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to execute payload.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe
    "C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\is-VC5F3.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VC5F3.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp" /SL5="$70066,721126,73216,C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe
        "C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe" /VERYSILENT
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Users\Admin\AppData\Local\Temp\is-IVAK3.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-IVAK3.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp" /SL5="$702DC,721126,73216,C:\Users\Admin\AppData\Local\Temp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1780
          • C:\Windows\SysWOW64\regsvr32.exe
            "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\netapi32_2.ocx"
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1204
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
              "PowerShell.exe" -NoProfile -NonInteractive -Command -
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4120
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3220
  • C:\Windows\system32\regsvr32.EXE
    C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Windows\SysWOW64\regsvr32.exe
      /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1492
  • C:\Windows\system32\regsvr32.EXE
    C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\SysWOW64\regsvr32.exe
      /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:264
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PowerShell.exe.log

    Filesize

    2KB

    MD5

    9751fcb3d8dc82d33d50eebe53abe314

    SHA1

    7a680212700a5d9f3ca67c81e0e243834387c20c

    SHA256

    ad2e3139aa438f799c4a876ca3e64af772b8a5786149925a08389723e42394d7

    SHA512

    54907cc18684ff892b737496183ca60c788d8f5d76365586954f269dbd50ac1b9cd48c7c50bd6ca02009e6020fd77a8282c9a7ad6b824a20585c505bd7e13709

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    6fd808065393b370edcdefae63dc789f

    SHA1

    dec7090035411a270c780c8022006ff2bad61645

    SHA256

    35d6e05f0140192a66c3f866e275e2f5cb0523d108fd4408bc681152006f55e8

    SHA512

    afdb47bc368fc19c3d4259f0a8e3cd0229799d94f87adafbafb4dfc5d51d1ab624ab0ca629a4d0feff6974946e82bf56cb4e9dbfea37a76819924e9cb8154343

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    21KB

    MD5

    3ea57738b2382018e2b713ed55c5b3d4

    SHA1

    afab5c47f43d8578c4e26306d999087492e6eb57

    SHA256

    081070cbfc6268113f615784661174c8955582ba49a1bd9376001ebd37e6262c

    SHA512

    28b3f86c12f42502159f3defbb9b5d746ab81cebfc8b66e2ef4322afd1058aae6f526abd38e31126e9118a268d38908ec78ebca12314d4742cfb833c8784968a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    0519c6a8b9d62ad9dbc13b0317630258

    SHA1

    94a601e6396b105181229258f41e8bd52181f864

    SHA256

    2c00e4ae4e7db50b5d2418a6ee25fe6aaf9fd69ce544ef18ad11c2bff8106001

    SHA512

    0ef93af6650ce1a75cd858b96a9634af952702356e92254844d3e85fd78f31bba24342751dfa61d0ef2172c72608c4983de63ce3f41e750ca979ad2e2874689b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    20KB

    MD5

    6a79bf9f2289a97707aac22d33f0ded5

    SHA1

    416fa0a153d542c9db49ae6187f154c13a01cda4

    SHA256

    7216d11adb5a8e0652f03a74c9d9b950a39cebd363df6dd2ec1a0f239b4ddd48

    SHA512

    3a1d41d07a569fbeb3418481c4d5826c2b7a1ac7d14190df1a52c885330b6cb5aaf5a3fb0abd3f796fafe5ae40edad8e67f0919afd2c46abfb85b81f143d91d5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mndtk55z.1fz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\is-QDDTT.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • C:\Users\Admin\AppData\Local\Temp\is-U2N6U.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • C:\Users\Admin\AppData\Local\Temp\is-VC5F3.tmp\62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed.tmp

    Filesize

    711KB

    MD5

    9917f679a0135245a5cc6b1aadcb3a6c

    SHA1

    7aab67a56fd3e10fd070e29d2998af2162c0a204

    SHA256

    a0090b3a687e7d0a6d6b6918bcbb798ebecb184cba8d3eb5fe4345ec9aba9243

    SHA512

    87194d9f3c97b48a297faef76e3a308de6b454d10a5b50adeb22336982ca5bd5ba3a1cacb39cfbaf78a3befbc37967eb89a7c84cfdd53054204647dffd5b35cd

  • C:\Users\Admin\AppData\Roaming\netapi32_2.ocx

    Filesize

    1.4MB

    MD5

    c87013ae4715ff280d9f8d2fe749cdba

    SHA1

    5e7e78ca3d2f799cb9befb0a2f13a1d5636a04af

    SHA256

    fef9803aa84de828968ffcaebab6050c109147d96420a753b9a6b5d1968ed4bf

    SHA512

    af9292f763dcd829d3d3d5aa1cd38bae54c2ceb92572f231ede1793e303173f3ba7eef17fe167a0fdc7dd25a9869bd18da4d9e3cb5c75573f1edb6ff1f2e5aaf

  • memory/264-212-0x0000000075790000-0x0000000075907000-memory.dmp

    Filesize

    1.5MB

  • memory/1204-89-0x0000000006D70000-0x0000000006E13000-memory.dmp

    Filesize

    652KB

  • memory/1204-78-0x0000000075470000-0x00000000754BC000-memory.dmp

    Filesize

    304KB

  • memory/1204-94-0x00000000070B0000-0x00000000070C1000-memory.dmp

    Filesize

    68KB

  • memory/1204-60-0x0000000002590000-0x00000000025C6000-memory.dmp

    Filesize

    216KB

  • memory/1204-61-0x0000000004DC0000-0x00000000053E8000-memory.dmp

    Filesize

    6.2MB

  • memory/1204-62-0x0000000004BB0000-0x0000000004BD2000-memory.dmp

    Filesize

    136KB

  • memory/1204-63-0x0000000004D50000-0x0000000004DB6000-memory.dmp

    Filesize

    408KB

  • memory/1204-64-0x00000000054F0000-0x0000000005556000-memory.dmp

    Filesize

    408KB

  • memory/1204-93-0x0000000007140000-0x00000000071D6000-memory.dmp

    Filesize

    600KB

  • memory/1204-74-0x0000000005660000-0x00000000059B4000-memory.dmp

    Filesize

    3.3MB

  • memory/1204-75-0x0000000005B70000-0x0000000005B8E000-memory.dmp

    Filesize

    120KB

  • memory/1204-76-0x0000000005BB0000-0x0000000005BFC000-memory.dmp

    Filesize

    304KB

  • memory/1204-77-0x0000000006D30000-0x0000000006D62000-memory.dmp

    Filesize

    200KB

  • memory/1204-92-0x0000000006F10000-0x0000000006F1A000-memory.dmp

    Filesize

    40KB

  • memory/1204-88-0x0000000006160000-0x000000000617E000-memory.dmp

    Filesize

    120KB

  • memory/1204-91-0x0000000006EB0000-0x0000000006ECA000-memory.dmp

    Filesize

    104KB

  • memory/1204-90-0x0000000007500000-0x0000000007B7A000-memory.dmp

    Filesize

    6.5MB

  • memory/1492-167-0x0000000005AB0000-0x0000000005E04000-memory.dmp

    Filesize

    3.3MB

  • memory/1492-181-0x0000000007590000-0x00000000075A1000-memory.dmp

    Filesize

    68KB

  • memory/1492-180-0x0000000007280000-0x0000000007323000-memory.dmp

    Filesize

    652KB

  • memory/1492-170-0x0000000070610000-0x000000007065C000-memory.dmp

    Filesize

    304KB

  • memory/1492-169-0x0000000006070000-0x00000000060BC000-memory.dmp

    Filesize

    304KB

  • memory/1512-201-0x0000000070610000-0x000000007065C000-memory.dmp

    Filesize

    304KB

  • memory/1660-58-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1660-25-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1660-23-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1780-36-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1780-55-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-30-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2112-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2112-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2380-142-0x0000000075790000-0x0000000075907000-memory.dmp

    Filesize

    1.5MB

  • memory/2380-150-0x0000000005F80000-0x000000000601C000-memory.dmp

    Filesize

    624KB

  • memory/2380-152-0x0000000075790000-0x0000000075907000-memory.dmp

    Filesize

    1.5MB

  • memory/2380-143-0x0000000002C50000-0x0000000002C68000-memory.dmp

    Filesize

    96KB

  • memory/2380-144-0x0000000005690000-0x0000000005C34000-memory.dmp

    Filesize

    5.6MB

  • memory/2380-147-0x0000000005300000-0x000000000530A000-memory.dmp

    Filesize

    40KB

  • memory/2380-146-0x0000000005360000-0x00000000053F2000-memory.dmp

    Filesize

    584KB

  • memory/2664-183-0x0000000075790000-0x0000000075907000-memory.dmp

    Filesize

    1.5MB

  • memory/3220-131-0x0000000075470000-0x00000000754BC000-memory.dmp

    Filesize

    304KB

  • memory/3508-27-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/3508-12-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/4120-109-0x0000000075470000-0x00000000754BC000-memory.dmp

    Filesize

    304KB

  • memory/4120-98-0x00000000054B0000-0x0000000005804000-memory.dmp

    Filesize

    3.3MB