Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
AA8FC5D95C790933704E3CEF84C6EB89.exe
Resource
win7-20240221-en
General
-
Target
AA8FC5D95C790933704E3CEF84C6EB89.exe
-
Size
710KB
-
MD5
aa8fc5d95c790933704e3cef84c6eb89
-
SHA1
4ab0502eb865233b7eaa693de35978b0f8c84328
-
SHA256
cc5488fc5c743d37268f55010af52d78bbaa3fafcb6353dba290b60982a17921
-
SHA512
8fd48c0cd12cdd5623990f67b06b4dffd07837c5ecf35cba8f996a9e456bf8ba0dadd34d9615deea6f6cb14e262b3a5927628a9af74b71d1cccbbef418579f5a
-
SSDEEP
12288:5maxpNBf2kBkD/BBy4gIpgTSV78GgJtnONe/T5fit:5maH+kBkDHzPpTp8GgJtn
Malware Config
Extracted
asyncrat
0.5.6D
Default
seznam.zapto.org:6606
seznam.zapto.org:7707
seznam.zapto.org:8808
ronymahmoud.casacam.net:6606
ronymahmoud.casacam.net:7707
ronymahmoud.casacam.net:8808
cznhhbaciwhxsrmpff
-
delay
6
-
install
true
-
install_file
micresofte.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1952-4-0x0000000000510000-0x0000000000522000-memory.dmp family_asyncrat behavioral1/memory/1672-21-0x00000000003B0000-0x00000000003C2000-memory.dmp family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1672 micresofte.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2400 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2696 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe Token: SeDebugPrivilege 1672 micresofte.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2644 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 28 PID 1952 wrote to memory of 2644 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 28 PID 1952 wrote to memory of 2644 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 28 PID 1952 wrote to memory of 2644 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 28 PID 1952 wrote to memory of 2004 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 30 PID 1952 wrote to memory of 2004 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 30 PID 1952 wrote to memory of 2004 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 30 PID 1952 wrote to memory of 2004 1952 AA8FC5D95C790933704E3CEF84C6EB89.exe 30 PID 2004 wrote to memory of 2696 2004 cmd.exe 33 PID 2004 wrote to memory of 2696 2004 cmd.exe 33 PID 2004 wrote to memory of 2696 2004 cmd.exe 33 PID 2004 wrote to memory of 2696 2004 cmd.exe 33 PID 2644 wrote to memory of 2400 2644 cmd.exe 32 PID 2644 wrote to memory of 2400 2644 cmd.exe 32 PID 2644 wrote to memory of 2400 2644 cmd.exe 32 PID 2644 wrote to memory of 2400 2644 cmd.exe 32 PID 2004 wrote to memory of 1672 2004 cmd.exe 34 PID 2004 wrote to memory of 1672 2004 cmd.exe 34 PID 2004 wrote to memory of 1672 2004 cmd.exe 34 PID 2004 wrote to memory of 1672 2004 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\AA8FC5D95C790933704E3CEF84C6EB89.exe"C:\Users\Admin\AppData\Local\Temp\AA8FC5D95C790933704E3CEF84C6EB89.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn AA8FC5D95C790933704E3CEF84C6EB89 /tr '"C:\Users\Admin\AppData\Roaming\micresofte.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn AA8FC5D95C790933704E3CEF84C6EB89 /tr '"C:\Users\Admin\AppData\Roaming\micresofte.exe"'3⤵
- Creates scheduled task(s)
PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp48C3.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2696
-
-
C:\Users\Admin\AppData\Roaming\micresofte.exe"C:\Users\Admin\AppData\Roaming\micresofte.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD55ae27a06a101e77a01f701fa68030fb0
SHA1911697d154d174b9d4a55751152b112bb118279f
SHA256b71669bd750ceaecd0f81a144fc5c8593f56ea49eb730dfd7d319f76111174b3
SHA51207898e7fd960d166c1bdef9a7b592fde7dc72ac2e4432a16fb638f6c86c7578ee48403519dd13effb59f469303d3b75ea582a502706585e3934de17d8e1f2486
-
Filesize
710KB
MD5aa8fc5d95c790933704e3cef84c6eb89
SHA14ab0502eb865233b7eaa693de35978b0f8c84328
SHA256cc5488fc5c743d37268f55010af52d78bbaa3fafcb6353dba290b60982a17921
SHA5128fd48c0cd12cdd5623990f67b06b4dffd07837c5ecf35cba8f996a9e456bf8ba0dadd34d9615deea6f6cb14e262b3a5927628a9af74b71d1cccbbef418579f5a