Analysis

  • max time kernel
    114s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 19:31

General

  • Target

    Client.exe

  • Size

    74KB

  • MD5

    6a8dc5c4d8d1268c80ec390ecc42928f

  • SHA1

    73b18060ecb59d943af0ceb663a24e54ecb9a5b4

  • SHA256

    f61d7473bd3d17fbb710ebf01d7a9f2b545a7f084ef49f7d7e2c3b39a63783ad

  • SHA512

    6ee01a6a2a8a70191153d1575ab65a2d5c300f53dd7434b1687f6bd16158b1f214f176ce9b67d13339e3dd8e87a660262678fb2dd9d12d921b3c5feba66e9dc0

  • SSDEEP

    1536:EUEkcx4VHsC0SPMV7e9VdQuDI6H1bf/Y4Qzc2LVclN:EUxcx4GfSPMV7e9VdQsH1bfQ4QPBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

132.145.75.68:5450

Mutex

ymydqsymqvxxbvpvyq

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:2312
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3312
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3588
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:2532
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:696
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:4184
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:368
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3964
            • C:\Windows\system32\systeminfo.exe
              systeminfo
              3⤵
              • Gathers system information
              PID:1032
            • C:\Windows\system32\HOSTNAME.EXE
              hostname
              3⤵
                PID:556
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic logicaldisk get caption,description,providername
                3⤵
                • Collects information from the system
                • Suspicious use of AdjustPrivilegeToken
                PID:1788
              • C:\Windows\system32\net.exe
                net user
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4404
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 user
                  4⤵
                    PID:4744
                • C:\Windows\system32\query.exe
                  query user
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3776
                  • C:\Windows\system32\quser.exe
                    "C:\Windows\system32\quser.exe"
                    4⤵
                      PID:1416
                  • C:\Windows\system32\net.exe
                    net localgroup
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1996
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 localgroup
                      4⤵
                        PID:3988
                    • C:\Windows\system32\net.exe
                      net localgroup administrators
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4888
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 localgroup administrators
                        4⤵
                          PID:3652
                      • C:\Windows\system32\net.exe
                        net user guest
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:316
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 user guest
                          4⤵
                            PID:1516
                        • C:\Windows\system32\net.exe
                          net user administrator
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:5028
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 user administrator
                            4⤵
                              PID:1900
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic startup get caption,command
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4464
                          • C:\Windows\system32\tasklist.exe
                            tasklist /svc
                            3⤵
                            • Enumerates processes with tasklist
                            PID:1084
                          • C:\Windows\system32\ipconfig.exe
                            ipconfig /all
                            3⤵
                            • Gathers network information
                            PID:4180
                          • C:\Windows\system32\ROUTE.EXE
                            route print
                            3⤵
                              PID:4176
                            • C:\Windows\system32\ARP.EXE
                              arp -a
                              3⤵
                              • Network Service Discovery
                              PID:2580
                            • C:\Windows\system32\NETSTAT.EXE
                              netstat -ano
                              3⤵
                              • System Network Connections Discovery
                              • Gathers network information
                              PID:3840
                            • C:\Windows\system32\sc.exe
                              sc query type= service state= all
                              3⤵
                              • Launches sc.exe
                              PID:4864
                            • C:\Windows\system32\netsh.exe
                              netsh firewall show state
                              3⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              PID:2084
                            • C:\Windows\system32\netsh.exe
                              netsh firewall show config
                              3⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              PID:436

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\5e88a0dc65f735a3b86f73980e9b8c8c\Admin@IQNFYLSS_en-US\System\Process.txt

                          Filesize

                          4KB

                          MD5

                          0a219faeb092e98270dcfd45c9c9fc88

                          SHA1

                          40431093b5873e807cbf6e50ae05d10fb76b385a

                          SHA256

                          16d4e6df87b763290df0a5ae767e8fd2d7f2b8e46c273734d2fd926a015bc0a4

                          SHA512

                          b57873b3c60f7ae29358c8f71a95e64ebda853b15608955ed992a6f3a5982a0af714e64c276a67aef1ff04042baf1dc503459f33fa5a5db48500e9249466aeec

                        • C:\Users\Admin\AppData\Local\5e88a0dc65f735a3b86f73980e9b8c8c\Admin@IQNFYLSS_en-US\System\Process.txt

                          Filesize

                          1KB

                          MD5

                          c4276fec3ce6c4846d33305ae53115a5

                          SHA1

                          c0af68c74e9829dcf9f60916e0526cdbb86cf32f

                          SHA256

                          c4939d929a40f2efd78c6dbc476c42f12c65ece262c8d29233cd5bb4795182e3

                          SHA512

                          fcd84683b379d264feb465c51e9f88a7e92d755bc47261ad7e3fda0a1f5d1132cee498b19f5ee9d25ce9e7d47197e233b2345c6b118f79d7693216de2bf08beb

                        • C:\Users\Admin\AppData\Local\5e88a0dc65f735a3b86f73980e9b8c8c\Admin@IQNFYLSS_en-US\System\Process.txt

                          Filesize

                          2KB

                          MD5

                          8da0b6505256f6075120e4d82f1bc45b

                          SHA1

                          3e78d00734034905c2dba169f1378acea6909edb

                          SHA256

                          bca84d863f04eaa02a78a604f4352160f78084f4862640c978977eeeaa9d1fe1

                          SHA512

                          52ba52bea9815cb5662d539e4d1e75af1281f11a4b52710253e82c8ba1f95018c427806b98ee9cb0dcfa2e305c0d4bc792702f58fa98335eeb0b8ce6c9519e47

                        • C:\Users\Admin\AppData\Local\5e88a0dc65f735a3b86f73980e9b8c8c\msgid.dat

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • memory/2312-10-0x00007FFAB1ED3000-0x00007FFAB1ED5000-memory.dmp

                          Filesize

                          8KB

                        • memory/2312-20-0x000000001CF30000-0x000000001D064000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2312-11-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-12-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-13-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-14-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-15-0x000000001C9B0000-0x000000001CA26000-memory.dmp

                          Filesize

                          472KB

                        • memory/2312-16-0x000000001B7F0000-0x000000001B800000-memory.dmp

                          Filesize

                          64KB

                        • memory/2312-17-0x000000001C930000-0x000000001C94E000-memory.dmp

                          Filesize

                          120KB

                        • memory/2312-18-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-19-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-0-0x00007FFAB1ED3000-0x00007FFAB1ED5000-memory.dmp

                          Filesize

                          8KB

                        • memory/2312-21-0x000000001CA30000-0x000000001CA3A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2312-8-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-7-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-4-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-135-0x000000001CA80000-0x000000001CAFA000-memory.dmp

                          Filesize

                          488KB

                        • memory/2312-178-0x000000001D860000-0x000000001D8E4000-memory.dmp

                          Filesize

                          528KB

                        • memory/2312-179-0x000000001CB50000-0x000000001CB72000-memory.dmp

                          Filesize

                          136KB

                        • memory/2312-3-0x00007FFAB1ED0000-0x00007FFAB2991000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2312-187-0x000000001CA40000-0x000000001CA4C000-memory.dmp

                          Filesize

                          48KB

                        • memory/2312-1-0x0000000000BB0000-0x0000000000BC8000-memory.dmp

                          Filesize

                          96KB