Analysis

  • max time kernel
    60s
  • max time network
    52s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/04/2025, 19:00

General

  • Target

    7b8f49ee16e33842749de6145dbec03a13ced02717ad905eee2d88e59718f455.exe

  • Size

    1.3MB

  • MD5

    b2176882f0392c4bf65d78beca48cb93

  • SHA1

    30b824d0c169dd45272abb85e03573d19acbb416

  • SHA256

    7b8f49ee16e33842749de6145dbec03a13ced02717ad905eee2d88e59718f455

  • SHA512

    54b3bacc09848691c9b9f011d33e8e769673b49454bec3c546f86e353524831af72920f6b0ac66356e2b551957a6e304d480e7c256c9e1e2f22f9dba5ed4b013

  • SSDEEP

    24576:2YVxlmFfqq4BNH8Ar3MVFGEkBvSbaliqOpr:txIWpRMV8PNxUr

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6666

127.0.0.1:30496

147.185.221.26:6666

147.185.221.26:30496

Attributes
  • delay

    2

  • install

    true

  • install_file

    Discord.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b8f49ee16e33842749de6145dbec03a13ced02717ad905eee2d88e59718f455.exe
    "C:\Users\Admin\AppData\Local\Temp\7b8f49ee16e33842749de6145dbec03a13ced02717ad905eee2d88e59718f455.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAawB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAbABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAZABmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAYgB0ACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3148
    • C:\Users\Admin\AppData\Local\Temp\GH Injector - x64.exe
      "C:\Users\Admin\AppData\Local\Temp\GH Injector - x64.exe"
      2⤵
      • Executes dropped EXE
      PID:684
    • C:\Users\Admin\AppData\Local\Temp\Discord.exe
      "C:\Users\Admin\AppData\Local\Temp\Discord.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3596
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4CF7.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5016
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4232
        • C:\Users\Admin\AppData\Roaming\Discord.exe
          "C:\Users\Admin\AppData\Roaming\Discord.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4988

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Discord.exe.log

    Filesize

    871B

    MD5

    1569f2c982851def168a6a1dad27317a

    SHA1

    cca0d9a1aca7b213c527efec865e1caee36fa127

    SHA256

    fc9a4ce0e2bd7b632291798d9b436861bd9006b858ee148811201ebfe6458e26

    SHA512

    78c9101c78f685829db5314a10f45485813b2ede4561facaa5f965d94077772a2e445610631be15230df27aaeacee08ddd4cd02a9398a5e3877e5b6c16bbe2c1

  • C:\Users\Admin\AppData\Local\Temp\Discord.exe

    Filesize

    342KB

    MD5

    11bca33947e3a77ec9dd7250805192b4

    SHA1

    c7b4ccbcc1ade9b5a484fca7399cb383bb3d4ea0

    SHA256

    dc860dd5a4ee1c7a3a3b4e6dbb77be0a3228bb4def6feac7953df212ab5bd519

    SHA512

    73cdc8ecad08f1687a7afc8feab85a3de0ea9d88e139ad80bc6fe5b488b40c3ad04ff419d04275fcb8c7f5fba05005ab37ef8d638093e66085801fa1022326b3

  • C:\Users\Admin\AppData\Local\Temp\GH Injector - x64.exe

    Filesize

    927KB

    MD5

    fac188061068468b413905c05ffe4a2e

    SHA1

    bc5159c4a2aabc8b138fd28da099c5c6e4e87c86

    SHA256

    16ac233c0be5784cf4b3bb0b3c94a9732609c6725d3982736280f04195d5304a

    SHA512

    3750a9e46d0d43e95e2369996661bc0c82511242c79d2aacd4e09455bba3abb8fa6eaf51880875d75cb920543108a5c8c8ebf6c0ea4fcf05a99eb40a6dd2357b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4t3n3fve.wmi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp4CF7.tmp.bat

    Filesize

    151B

    MD5

    b2fea4b9882072ea9d97500d4bbfb933

    SHA1

    74cf46a2a2d8b77829591953993895241dd21e11

    SHA256

    0d0456ba836332aed1fe213442a1c4f45e7712161c965fca141352d39fd2ed68

    SHA512

    246cc8e25698fdb3f1ea9667797765bb47178d607c2050bb6860a1b7f29934f96db9ef8b3a653b04f490134b15d6019ad61292a74c943c2a1469c1e1974f105c

  • memory/684-20-0x00007FF6127E0000-0x00007FF6129E8000-memory.dmp

    Filesize

    2.0MB

  • memory/684-73-0x00007FF6127E0000-0x00007FF6129E8000-memory.dmp

    Filesize

    2.0MB

  • memory/3148-41-0x0000000007690000-0x00000000076C4000-memory.dmp

    Filesize

    208KB

  • memory/3148-53-0x0000000008060000-0x00000000086DA000-memory.dmp

    Filesize

    6.5MB

  • memory/3148-28-0x0000000005F40000-0x0000000005FA6000-memory.dmp

    Filesize

    408KB

  • memory/3148-27-0x0000000005840000-0x0000000005862000-memory.dmp

    Filesize

    136KB

  • memory/3148-38-0x00000000061D0000-0x0000000006527000-memory.dmp

    Filesize

    3.3MB

  • memory/3148-39-0x00000000066D0000-0x00000000066EE000-memory.dmp

    Filesize

    120KB

  • memory/3148-40-0x0000000006760000-0x00000000067AC000-memory.dmp

    Filesize

    304KB

  • memory/3148-26-0x0000000005910000-0x0000000005F3A000-memory.dmp

    Filesize

    6.2MB

  • memory/3148-42-0x00000000710C0000-0x000000007110C000-memory.dmp

    Filesize

    304KB

  • memory/3148-51-0x00000000076D0000-0x00000000076EE000-memory.dmp

    Filesize

    120KB

  • memory/3148-52-0x00000000078F0000-0x0000000007994000-memory.dmp

    Filesize

    656KB

  • memory/3148-29-0x0000000006120000-0x0000000006186000-memory.dmp

    Filesize

    408KB

  • memory/3148-54-0x0000000007A20000-0x0000000007A3A000-memory.dmp

    Filesize

    104KB

  • memory/3148-55-0x0000000007AB0000-0x0000000007ABA000-memory.dmp

    Filesize

    40KB

  • memory/3148-56-0x0000000007CB0000-0x0000000007D46000-memory.dmp

    Filesize

    600KB

  • memory/3148-57-0x0000000007C40000-0x0000000007C51000-memory.dmp

    Filesize

    68KB

  • memory/3148-58-0x0000000007C70000-0x0000000007C7E000-memory.dmp

    Filesize

    56KB

  • memory/3148-59-0x0000000007C80000-0x0000000007C95000-memory.dmp

    Filesize

    84KB

  • memory/3148-60-0x0000000007D70000-0x0000000007D8A000-memory.dmp

    Filesize

    104KB

  • memory/3148-65-0x0000000007D60000-0x0000000007D68000-memory.dmp

    Filesize

    32KB

  • memory/3148-25-0x0000000005250000-0x0000000005286000-memory.dmp

    Filesize

    216KB

  • memory/4568-24-0x00007FF94FC63000-0x00007FF94FC65000-memory.dmp

    Filesize

    8KB

  • memory/4568-23-0x0000000000610000-0x000000000066C000-memory.dmp

    Filesize

    368KB