Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
Resource
win7-20240903-en
General
-
Target
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe
-
Size
30.1MB
-
MD5
5fb9e419d4ae63f3483630e314aedf4b
-
SHA1
fd0e4f4c9faacf239154bffc4ab9df2a36d5a38a
-
SHA256
ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72
-
SHA512
50dd2aaf40a63c2604b74a303402344d5d34e8191790099a23dd842baa98fca108c414352e167485b2ee333a184eb17667d0ae9036920c8b1f49104c6f627f4b
-
SSDEEP
786432:CGHzzuqE2+z5m4K+I6yybsorCII/v9ZH4+gX/AxWMX84j5NF:CGHzm2+zvKb6yybHrCJDzSAxZF
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000014c66-15.dat family_asyncrat -
Executes dropped EXE 5 IoCs
pid Process 2956 runtime.exe 2108 svchost.exe 1860 loader.exe 2508 loader.exe 536 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 1860 loader.exe 2508 loader.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 5 pastebin.com 6 pastebin.com 7 pastebin.com 8 pastebin.com 9 pastebin.com 11 pastebin.com 4 pastebin.com 10 pastebin.com 12 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 592 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 2252 powershell.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe 536 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 2108 svchost.exe Token: SeDebugPrivilege 2108 svchost.exe Token: SeDebugPrivilege 536 svchost.exe Token: SeDebugPrivilege 536 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 536 svchost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2252 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 28 PID 1316 wrote to memory of 2252 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 28 PID 1316 wrote to memory of 2252 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 28 PID 1316 wrote to memory of 2252 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 28 PID 1316 wrote to memory of 2956 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1316 wrote to memory of 2956 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1316 wrote to memory of 2956 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1316 wrote to memory of 2956 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 30 PID 1316 wrote to memory of 2108 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1316 wrote to memory of 2108 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1316 wrote to memory of 2108 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1316 wrote to memory of 2108 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 31 PID 1316 wrote to memory of 1860 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 32 PID 1316 wrote to memory of 1860 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 32 PID 1316 wrote to memory of 1860 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 32 PID 1316 wrote to memory of 1860 1316 ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe 32 PID 2956 wrote to memory of 2668 2956 runtime.exe 33 PID 2956 wrote to memory of 2668 2956 runtime.exe 33 PID 2956 wrote to memory of 2668 2956 runtime.exe 33 PID 1860 wrote to memory of 2508 1860 loader.exe 34 PID 1860 wrote to memory of 2508 1860 loader.exe 34 PID 1860 wrote to memory of 2508 1860 loader.exe 34 PID 2108 wrote to memory of 1740 2108 svchost.exe 35 PID 2108 wrote to memory of 1740 2108 svchost.exe 35 PID 2108 wrote to memory of 1740 2108 svchost.exe 35 PID 2108 wrote to memory of 2560 2108 svchost.exe 37 PID 2108 wrote to memory of 2560 2108 svchost.exe 37 PID 2108 wrote to memory of 2560 2108 svchost.exe 37 PID 1740 wrote to memory of 1288 1740 cmd.exe 39 PID 1740 wrote to memory of 1288 1740 cmd.exe 39 PID 1740 wrote to memory of 1288 1740 cmd.exe 39 PID 2560 wrote to memory of 592 2560 cmd.exe 40 PID 2560 wrote to memory of 592 2560 cmd.exe 40 PID 2560 wrote to memory of 592 2560 cmd.exe 40 PID 2560 wrote to memory of 536 2560 cmd.exe 41 PID 2560 wrote to memory of 536 2560 cmd.exe 41 PID 2560 wrote to memory of 536 2560 cmd.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe"C:\Users\Admin\AppData\Local\Temp\ad091aff1603773230aa3ec020c30c96bf53e36baaf128c5056bc06d8254ca72.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAaABuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGwAdwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAZwB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAYQBwACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\runtime.exe"C:\Users\Admin\AppData\Local\Temp\runtime.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2956 -s 5283⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBD47.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:592
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\onefile_1860_133876100818826000\loader.exeC:\Users\Admin\AppData\Local\Temp\loader.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.7MB
MD54ed0d5143664ce4d6a25072f1c465616
SHA1e560ecd9fe3a6754d72493d9e0e796e3837be5df
SHA256ac9bb0231e3e3e4305a2cf44708dbf7e0e6cfa286faac9bc687c364a4070e398
SHA512d763f44d7a5bff11a3a75c7b4182362ad63d33618402480aa3c993b1ed8f21dfda0e70cf25e71e33ffac5f9ca541fa0a3c96c53abb510fc36a5917373528f466
-
Filesize
12.0MB
MD5d40e357c84cda7eb31419a69ae038d97
SHA1853d03a0cfe3aa0f21d16b2da378e4554c71a088
SHA25645215606ecea7c6d2624d05ee6b0703beb9d0abdf42566c77ccb89576338b8c6
SHA51282a67c7be3fef7d4deb4d1c1e85d392fdfb16e830f9574868c8bcc42aa3eb8a3435b0d3d0786a1015af8f8b41f66074a1825a24eb559e42b164aca71ee3dca2f
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
151B
MD5fca45214cb8cdfe19ecb3c874564bfbc
SHA15ef4f9567f0805a8fb51e97a30374ce1e2ca4fbd
SHA256ddaa8b042623bc9ce2ca95359897eec9dcabb54d85b2c14c0ad39a241506c1aa
SHA512a8a979d14aebcaae3fb2cf9f7ed0ebdcafb7cb438fc178e967bb662a6e776567a02e3fb0d0d5cb7e7bad609089e5df97e3107269ce120fa6deffff6f4ea83eb7
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
58KB
MD51ab99ff9dfb2017db1a59403f5ca1c2b
SHA14e43875075d8dd21755aa8dd91365d561be43594
SHA256bd9f8e352f172f3a5ad106388d1fd67ed09f419f1d100bd89e7980e25d273526
SHA51244bb3c86caa4b2c0c63251d602f03aa5a38d099ece58462dc78d38740981733b731711250b34db2a93c8b2a1fab7e707e29ee010b24129d762daed226d72ca4a
-
Filesize
74KB
MD585f89a5f5806117cc82aec6e1f89cd13
SHA1735d2331d6bc90498f3f1405af0dffa37b136e5d
SHA256adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
SHA512038c96c575f0a1204a4159cd7ac9262f7e1447be9bba28278ddcdd6294280f40399cfb06a89e40460114306c9b5a33d466ac2de7af58575b80cad0921f4a979d