Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 07:56
Behavioral task
behavioral1
Sample
bf53ed4544ae919496ff12f7969ba3dc.exe
Resource
win7-20230831-en
General
-
Target
bf53ed4544ae919496ff12f7969ba3dc.exe
-
Size
47KB
-
MD5
bf53ed4544ae919496ff12f7969ba3dc
-
SHA1
cd2a5ac9357bc733dbce4bc2f8ee488199154b57
-
SHA256
641926faa61b285dc56392e849301861e5f786a3e45a7373dd334f34aa65d40d
-
SHA512
d71df91d569c890dc4be16737ee17692f1f6fa434eb64d0cb81e6c6e9491a7a6306011859907ea805b7495739a7bddb535790420310b0fb8ab9d46958ba97be7
-
SSDEEP
768:auu91TwQsOnFWUF01/mo2qDpwUJ+CQswGhWPI8fhMz+0b+FOAjv5JQgMc4jmXDBc:auu91TwSo2JQhf8fAxb+FTjv5JQhdiXy
Malware Config
Extracted
asyncrat
0.5.7B
Default
65.108.24.87:6606
65.108.24.87:7707
65.108.24.87:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
win10.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2320-0-0x0000000000DA0000-0x0000000000DB2000-memory.dmp asyncrat behavioral1/files/0x0009000000012021-13.dat asyncrat behavioral1/files/0x0009000000012021-14.dat asyncrat behavioral1/files/0x0009000000012021-15.dat asyncrat behavioral1/memory/2872-16-0x00000000001F0000-0x0000000000202000-memory.dmp asyncrat behavioral1/memory/2872-18-0x0000000000620000-0x0000000000660000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2872 win10.exe -
Loads dropped DLL 1 IoCs
pid Process 2808 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2264 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 2320 bf53ed4544ae919496ff12f7969ba3dc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2320 bf53ed4544ae919496ff12f7969ba3dc.exe Token: SeDebugPrivilege 2872 win10.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2632 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 28 PID 2320 wrote to memory of 2632 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 28 PID 2320 wrote to memory of 2632 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 28 PID 2320 wrote to memory of 2632 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 28 PID 2320 wrote to memory of 2808 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 30 PID 2320 wrote to memory of 2808 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 30 PID 2320 wrote to memory of 2808 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 30 PID 2320 wrote to memory of 2808 2320 bf53ed4544ae919496ff12f7969ba3dc.exe 30 PID 2632 wrote to memory of 2804 2632 cmd.exe 32 PID 2632 wrote to memory of 2804 2632 cmd.exe 32 PID 2632 wrote to memory of 2804 2632 cmd.exe 32 PID 2632 wrote to memory of 2804 2632 cmd.exe 32 PID 2808 wrote to memory of 2264 2808 cmd.exe 33 PID 2808 wrote to memory of 2264 2808 cmd.exe 33 PID 2808 wrote to memory of 2264 2808 cmd.exe 33 PID 2808 wrote to memory of 2264 2808 cmd.exe 33 PID 2808 wrote to memory of 2872 2808 cmd.exe 34 PID 2808 wrote to memory of 2872 2808 cmd.exe 34 PID 2808 wrote to memory of 2872 2808 cmd.exe 34 PID 2808 wrote to memory of 2872 2808 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf53ed4544ae919496ff12f7969ba3dc.exe"C:\Users\Admin\AppData\Local\Temp\bf53ed4544ae919496ff12f7969ba3dc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win10" /tr '"C:\Users\Admin\AppData\Roaming\win10.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "win10" /tr '"C:\Users\Admin\AppData\Roaming\win10.exe"'3⤵
- Creates scheduled task(s)
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp56A8.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2264
-
-
C:\Users\Admin\AppData\Roaming\win10.exe"C:\Users\Admin\AppData\Roaming\win10.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
149B
MD5ded99944e4d52827cd57579a0fd46fdb
SHA191990c645eae26f07bfd8185c2b72f8fd27b3fba
SHA2568776f2a2a56281745b0c901e11f8a2945c8e462d7edb8c8777892d24d009eb52
SHA512c3c503ca79a72c387ee174bbd37c245452f36574e72c364d55228c8ce3649a24bb81f07116da12f742f5e1186c1359b928b4f4115b00672b6d63687eacf130b9
-
Filesize
149B
MD5ded99944e4d52827cd57579a0fd46fdb
SHA191990c645eae26f07bfd8185c2b72f8fd27b3fba
SHA2568776f2a2a56281745b0c901e11f8a2945c8e462d7edb8c8777892d24d009eb52
SHA512c3c503ca79a72c387ee174bbd37c245452f36574e72c364d55228c8ce3649a24bb81f07116da12f742f5e1186c1359b928b4f4115b00672b6d63687eacf130b9
-
Filesize
47KB
MD5bf53ed4544ae919496ff12f7969ba3dc
SHA1cd2a5ac9357bc733dbce4bc2f8ee488199154b57
SHA256641926faa61b285dc56392e849301861e5f786a3e45a7373dd334f34aa65d40d
SHA512d71df91d569c890dc4be16737ee17692f1f6fa434eb64d0cb81e6c6e9491a7a6306011859907ea805b7495739a7bddb535790420310b0fb8ab9d46958ba97be7
-
Filesize
47KB
MD5bf53ed4544ae919496ff12f7969ba3dc
SHA1cd2a5ac9357bc733dbce4bc2f8ee488199154b57
SHA256641926faa61b285dc56392e849301861e5f786a3e45a7373dd334f34aa65d40d
SHA512d71df91d569c890dc4be16737ee17692f1f6fa434eb64d0cb81e6c6e9491a7a6306011859907ea805b7495739a7bddb535790420310b0fb8ab9d46958ba97be7
-
Filesize
47KB
MD5bf53ed4544ae919496ff12f7969ba3dc
SHA1cd2a5ac9357bc733dbce4bc2f8ee488199154b57
SHA256641926faa61b285dc56392e849301861e5f786a3e45a7373dd334f34aa65d40d
SHA512d71df91d569c890dc4be16737ee17692f1f6fa434eb64d0cb81e6c6e9491a7a6306011859907ea805b7495739a7bddb535790420310b0fb8ab9d46958ba97be7