Analysis

  • max time kernel
    5s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 19:21

General

  • Target

    6cdd270a2bad95c8a063a9fe876f6c454f2b5219164c476e2bf94350ab050618.exe

  • Size

    73KB

  • MD5

    75e679528300f0eec2aab97faf87a0b1

  • SHA1

    5f5e310edf9b08693a31003a91071b5b4b7bfd39

  • SHA256

    6cdd270a2bad95c8a063a9fe876f6c454f2b5219164c476e2bf94350ab050618

  • SHA512

    7b051d593aa6c20ec50018c56f834388345f025c2e5257cd0c887aeb15f6e6302e57c91b3009ae65a5456aef3c338a5603bda45240eaa325e7636475fe01d935

  • SSDEEP

    768:btF3S1PK+iPDVwir9JSIEZvkYIuu7tkA1+BSrv7mqb2nyHpwH1oQWM4Vp8GX90P7:BkKhJ2ZsYCnn/bb5weMrGX90+t3VclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    3

  • install

    true

  • install_file

    MicrosoftEdgeUpdate.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/ZnhxAV6a

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdd270a2bad95c8a063a9fe876f6c454f2b5219164c476e2bf94350ab050618.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdd270a2bad95c8a063a9fe876f6c454f2b5219164c476e2bf94350ab050618.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MicrosoftEdgeUpdate" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdate.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "MicrosoftEdgeUpdate" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdate.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2476
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC63C.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1620
      • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdate.exe
        "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdate.exe"
        3⤵
          PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpC63C.tmp.bat

      Filesize

      163B

      MD5

      404ddeb551acc17ab3f8f4110282bcee

      SHA1

      5005e43e03b7595427c55c5eab2904ad7021ef41

      SHA256

      f7f440138391955281723d4c6f7538364c9e671ea19041e67c7990b39a412ead

      SHA512

      3dab029c0e1a4a99bf99be9aa8a3246886a4929484974566b7ba8f2d03a1170b66420ed72247d3047170f361027495130afecef5e4446387df9ee9b1706c0aa4

    • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdate.exe

      Filesize

      73KB

      MD5

      75e679528300f0eec2aab97faf87a0b1

      SHA1

      5f5e310edf9b08693a31003a91071b5b4b7bfd39

      SHA256

      6cdd270a2bad95c8a063a9fe876f6c454f2b5219164c476e2bf94350ab050618

      SHA512

      7b051d593aa6c20ec50018c56f834388345f025c2e5257cd0c887aeb15f6e6302e57c91b3009ae65a5456aef3c338a5603bda45240eaa325e7636475fe01d935

    • memory/1908-0-0x000007FEF5BD3000-0x000007FEF5BD4000-memory.dmp

      Filesize

      4KB

    • memory/1908-1-0x0000000001390000-0x00000000013A8000-memory.dmp

      Filesize

      96KB

    • memory/1908-2-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1908-12-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp

      Filesize

      9.9MB

    • memory/1908-11-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2856-17-0x0000000001330000-0x0000000001348000-memory.dmp

      Filesize

      96KB