Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 21:32

General

  • Target

    Dropper.exe

  • Size

    18.0MB

  • MD5

    392b044ac8ee5751045a163b2d1a358f

  • SHA1

    56429e69619c0e69128732051db6e0e9bc40c18c

  • SHA256

    1001e70668789e08f7979484610e5246fa3c760142bc3ca8a55ce3da2301907a

  • SHA512

    2d0fd9963373132fde1d442d742efc95e8510f61325518aead420eeffb70e2a7566d95d3015ad930c4beddd2aa3d5b937b5711d0b0d09ee795eb6136aa26409b

  • SSDEEP

    393216:m9YidhKRmmb1TfHqO1UyXMCHWUjlVg74wdugWIPPVBFVVJo8W:m9Yidh0MyXMb8PDwduGPPVNV+8W

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

192.168.1.222:6606

192.168.1.222:7707

192.168.1.222:8808

Mutex

mA2752pAY1JK

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

192.168.1.222:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\Dropper.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe
      "C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe" 0
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1716
    • C:\Users\Admin\AppData\Local\Temp\pile.exe
      "C:\Users\Admin\AppData\Local\Temp\pile.exe" 0
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Roaming\0.exe
        "C:\Users\Admin\AppData\Roaming\0.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1728
      • C:\Users\Admin\AppData\Roaming\1.exe
        "C:\Users\Admin\AppData\Roaming\1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
      "C:\Users\Admin\AppData\Local\Temp\XClient.exe" 0
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2256
    • C:\Users\Admin\AppData\Local\Temp\trap1.exe
      "C:\Users\Admin\AppData\Local\Temp\trap1.exe" 0
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\trap1.exe
        "C:\Users\Admin\AppData\Local\Temp\trap1.exe" 0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\python313.dll

    Filesize

    5.8MB

    MD5

    501080884bed38cb8801a307c9d7b7b4

    SHA1

    881b250cc8f4fa4f75111ac557a4fde8e1e217af

    SHA256

    bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749

    SHA512

    63d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9

  • \Users\Admin\AppData\Local\Temp\AsyncClient2.exe

    Filesize

    47KB

    MD5

    552ffc8c5f01477794e54ca98130f2d3

    SHA1

    3232ea63d8a89ecf9d188b84c2090ed0aa5740ed

    SHA256

    a161c7118b90a154291649f3c135d3d4e5f100e8017b01ea912a46e90ad28b87

    SHA512

    55da0b761f87f1d0328bc606c9ae49277d7e455d40e394b839a7e4d1a5ade6b3069db5209b29caa4dce02c5b2f5f33840ac788d8bee075a6fff0dbb6530fa2d4

  • \Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    72KB

    MD5

    b98d6315ae637e71ff52fc89ee293606

    SHA1

    005064d052b5404c63323684482beb3be33799c8

    SHA256

    23c49a66fad823d47a1cb2e742ac4c12f51d6597f35f31635ab26337e59b410b

    SHA512

    2c7a22ac894ee34d00f8f334bb26fb0a9da32162e5d0d000a9bdeb6d2b63dee9768aaaf6fb68d2d229b29576b71af7cda5758f503252187a3d6030da9088ec74

  • \Users\Admin\AppData\Local\Temp\pile.exe

    Filesize

    431KB

    MD5

    6fecf711df62b628669d1027d14a4bf5

    SHA1

    6062a129555a89ee968c84aabb45ae7a59b0b44b

    SHA256

    0a83e74cc52104c71010d4d66703ff34d5a9245a9d46f7926fc667ad4201550c

    SHA512

    e2fa8590ec04bbf1db51dc692684e00d6e6fe5ae77da398900348dda5859cffc3455138ec0ab9434e624b394b68a6d8750a41514f34108b40121231eb19f88b5

  • \Users\Admin\AppData\Local\Temp\trap1.exe

    Filesize

    17.4MB

    MD5

    f99bcfad4d7e5b4034a208231ab52a68

    SHA1

    ca2cae0d8b7d656e355c3b9dcda0aed3b3de9534

    SHA256

    2971c12fa4af39c67f2f59e391f118e350f9824d198c54b0634de9f4cdc963b9

    SHA512

    78d327c84f6a69a09257057250a1db7ee21725d0fee4a75f5d07389f986fb5ceb6015a74a9d0b5d3ecd7ba77c0d473c4bd17a2dd62a5895221c019af1a173587

  • memory/1716-21-0x0000000000FC0000-0x0000000000FD2000-memory.dmp

    Filesize

    72KB

  • memory/1728-124-0x0000000000D60000-0x0000000000D72000-memory.dmp

    Filesize

    72KB

  • memory/1812-135-0x0000000000B30000-0x0000000000B48000-memory.dmp

    Filesize

    96KB

  • memory/2256-22-0x0000000001220000-0x0000000001238000-memory.dmp

    Filesize

    96KB

  • memory/2516-23-0x0000000000080000-0x00000000000F2000-memory.dmp

    Filesize

    456KB