Analysis

  • max time kernel
    66s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 03:27

General

  • Target

    2025-04-05_9c98dc43dc994609c78345135b429b97_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe

  • Size

    73.6MB

  • MD5

    9c98dc43dc994609c78345135b429b97

  • SHA1

    f08ac25c89e3dbe81d4fcdb5227fce849279e803

  • SHA256

    9c55248df602d934cc7f54b56b152cd5e02222109f1547302f13f94380c08e32

  • SHA512

    bf782f60171734dc6c67e37ca74f4c1df06ad45938a28dd21ef278908f35c78f1c2ea9b74f2263d5ccebe95a155d4d70e3744f57abae15aaa0b3e928881b983a

  • SSDEEP

    393216:C76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yf7nVQx4urYsANulL7N1:C0LoCOn+27s4urYDNulLBiup

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • VenomRAT 1 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-05_9c98dc43dc994609c78345135b429b97_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-05_9c98dc43dc994609c78345135b429b97_black-basta_cobalt-strike_coinminer_satacom_zxxz.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\neww.exe
      C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\neww.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1352
          4⤵
          • Program crash
          PID:1012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4052 -ip 4052
    1⤵
      PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\mscorlib.dll

      Filesize

      3.2MB

      MD5

      2a9d648e26737cf10e007466e69b32ad

      SHA1

      c6164fdd994f1b61b34a6f843fedc283adace311

      SHA256

      ff5bc05e7cf56a0bfc0f76871700a1e47248a906861507b22d3e1863114ed57f

      SHA512

      cadebefb8f5ceb41e9fb2130607fc71a4b309f813818ed8ca8ec077c92faeac4c8207d6c57f0e0cd5d347fe302b1eeb96c205402fc80ddc59c104eb65f12aabd

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-2.0.dll

      Filesize

      19.0MB

      MD5

      4c0f588776766601d238212793dbd265

      SHA1

      1d93b1fb2c4d1e4560845c33802556a32ef03f44

      SHA256

      6803e2ae189007eca3341bb929ff4787da7eb02d0a5138377863d63a9a53b4a4

      SHA512

      53334c64ba2ddfb22cd16d975f561f6efb28411c226b47c0d888d0d24a1dadcf6d875df9b473e4282a2c8581394fbef707515906cf3017504bfb0d67e95069e9

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-bz2-1.dll

      Filesize

      76KB

      MD5

      2ce8ffa22b809cd554553f91d1cc4120

      SHA1

      cfcb93ee08bc62cd4e81e2bbfef5958cc2767116

      SHA256

      d8960f2c96c1cfd331a4ba3e9b1168d468bf21b9b9e35d56574c41ae216528fd

      SHA512

      2b8c8b59ad4154e98b0208fff587be755469f87304ff31c784e6f436799bb952e2a4c3e58dd0f6eed7a2fbb1efe32d914fe8172aba09aa3f7c5809fe8fa0c383

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-gcrypt-20.dll

      Filesize

      809KB

      MD5

      1ef19a4c70d6a70ccd3beb7cf3f8f3fb

      SHA1

      09f27e34dbc7d8050653568a08efff6e97402487

      SHA256

      01d0a9c35bf1909d6c9c12938c944fa6e966d9731b3d523241148d73457fe228

      SHA512

      05fd1f4d53403d85bd5be278e4f97dc6573ee467ef4c97c14cf43719254bbc752229f833477215ba654df1f10d7ea1a2446160858083bcdbbb950c9125db643a

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-gpg-error-0.dll

      Filesize

      4.3MB

      MD5

      2617b5952d0dc1d30501a3b7b51e5f3a

      SHA1

      ed7c004849cd1d2ff0bb5090f37b2f2e41244632

      SHA256

      9af39637c3464dcbc925b24c4ad69c2892ff8f6714470068e1cf3e94798a995a

      SHA512

      88b47a02d530fb26639152947e4612f3465d3c77b6d603cdcd725950826f5d1e430cc044a6584dad0491573015c96985dbfbbd294942a3535866ef513ad6205d

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-iconv-2.dll

      Filesize

      1.0MB

      MD5

      201a1e2cb51fd63de986eb10eb63b102

      SHA1

      490c2432dc6be8b413379df1dd1e3cc2a2c2afc0

      SHA256

      8903f3e555910ce61d04d7701918cc1e2ebf58b538b50bc8bb46977a9aee220e

      SHA512

      a68bc678882ae7a91be78ce389813d3f6d04aeecd16662b2ec72ebf7c9d02e3385806de3486e9e038e49803ac713041ef060920e84da637aab175bbc03c758a3

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-intl-8.dll

      Filesize

      118KB

      MD5

      9e3c2aae15ca4d64663f6a2aae34f49a

      SHA1

      9b729ba542116f7f4436075cf8972e5d00dab31e

      SHA256

      b01721c410ac4a47a24927bd60dce4f7b1669684755e9ee52596493778dba956

      SHA512

      42240a60ec4db3539d48966b41301c638be7165a0dba408d6264ab59130c749ee5a30aa7f5f9f38fea644afd0d3374c620a04916682f08559f482938caf47061

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\msys-z.dll

      Filesize

      96KB

      MD5

      e2d249c598602e4f2319c8666506b82b

      SHA1

      20efc47cb2e853a0f5886d3d6e282766284ef81d

      SHA256

      fb025d533f2225d62b50cc47e7cfe0d0bd506675a3c40bc70190aa4de8abb8fb

      SHA512

      b34104c4a715fed610de685fbf822bc167697a6e5561bd0b3ce5d6707b54516ff7c00afae518889b0e4a1b5063c2a9f2bea20b099eea4f7fb3ba933e185e5c37

    • C:\Users\Admin\AppData\Local\Temp\4ee8582ff213b2ab1656a4aa3212f11a\neww.exe

      Filesize

      72KB

      MD5

      9fa17f438815b4a61e69e35bbdaeba8b

      SHA1

      1d038227b4d7d198ca58e1b3eba2109defc23893

      SHA256

      050b95baf2df2f56926f4e3b37984de202a3609f210b2ff4680acba59aa8d95b

      SHA512

      9fa4dbad76b6d6e33305820064bc69f2feddf9c64fc7de809684265605ba89632691f43de05f49806dc9463957b15dbe8f491887ddea0d5fd12c4d08bdfa9765

    • memory/2152-41-0x00000000020A0000-0x0000000003311000-memory.dmp

      Filesize

      18.4MB

    • memory/2152-39-0x0000000461220000-0x0000000461237000-memory.dmp

      Filesize

      92KB

    • memory/2152-40-0x0000000210040000-0x00000002112B1000-memory.dmp

      Filesize

      18.4MB

    • memory/2152-38-0x0000000430B30000-0x0000000430B52000-memory.dmp

      Filesize

      136KB

    • memory/2152-37-0x00000005603F0000-0x0000000560500000-memory.dmp

      Filesize

      1.1MB

    • memory/2152-35-0x00000004AEE70000-0x00000004AEF3D000-memory.dmp

      Filesize

      820KB

    • memory/2152-34-0x0000000100400000-0x0000000100416000-memory.dmp

      Filesize

      88KB

    • memory/2152-36-0x0000000522FE0000-0x0000000522FFD000-memory.dmp

      Filesize

      116KB

    • memory/2152-32-0x0000000000E20000-0x0000000002091000-memory.dmp

      Filesize

      18.4MB

    • memory/2152-31-0x0000000003320000-0x0000000004591000-memory.dmp

      Filesize

      18.4MB

    • memory/4052-33-0x0000000000400000-0x000000000073E000-memory.dmp

      Filesize

      3.2MB

    • memory/4052-42-0x00000000056A0000-0x0000000005C44000-memory.dmp

      Filesize

      5.6MB

    • memory/4052-43-0x00000000051F0000-0x0000000005256000-memory.dmp

      Filesize

      408KB