Analysis
-
max time kernel
118s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
712940BAEF78C821E36B8701BF073C52.exe
Resource
win7-20231129-en
General
-
Target
712940BAEF78C821E36B8701BF073C52.exe
-
Size
91KB
-
MD5
712940baef78c821e36b8701bf073c52
-
SHA1
d59896b87424fafc0d00ab5e5c2019bd941167ce
-
SHA256
08f8498aec75418bb4c12972a6547ee2c4762160e7bf36c558a91b7b9110ed3f
-
SHA512
68bc6df413e00e6420ee6db6e4d0497bab61908b96f48fdb6bf6aae9bed72de840d83dfc0017dd24995a05f29b415b82852f84e9b74de85d303b67cc396c7007
-
SSDEEP
1536:qoJFOWbLXbbetrgpFZ2nrWLtyEclopV4c78eiV:zFOWbLLbetrgQn6BpVD34
Malware Config
Extracted
asyncrat
0.5.8 - Customized by Mikewaals
Default
204.12.199.30:6606
204.12.199.30:7707
204.12.199.30:8808
Bbtt03i3Zbxo
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
712940BAEF78C821E36B8701BF073C52.exedescription pid process target process PID 2372 set thread context of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe -
Executes dropped EXE 2 IoCs
Processes:
Accounts_Ledger_Software.eXEAccounts_Ledger_Software.eXEpid process 2900 Accounts_Ledger_Software.eXE 1432 Accounts_Ledger_Software.eXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
712940BAEF78C821E36B8701BF073C52.exeAccounts_Ledger_Software.eXEAccounts_Ledger_Software.eXEpid process 2372 712940BAEF78C821E36B8701BF073C52.exe 2372 712940BAEF78C821E36B8701BF073C52.exe 2372 712940BAEF78C821E36B8701BF073C52.exe 2372 712940BAEF78C821E36B8701BF073C52.exe 2900 Accounts_Ledger_Software.eXE 2900 Accounts_Ledger_Software.eXE 1432 Accounts_Ledger_Software.eXE 1432 Accounts_Ledger_Software.eXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
712940BAEF78C821E36B8701BF073C52.exeaspnet_compiler.exeAccounts_Ledger_Software.eXEAccounts_Ledger_Software.eXEdescription pid process Token: SeDebugPrivilege 2372 712940BAEF78C821E36B8701BF073C52.exe Token: SeDebugPrivilege 2724 aspnet_compiler.exe Token: SeDebugPrivilege 2900 Accounts_Ledger_Software.eXE Token: SeDebugPrivilege 1432 Accounts_Ledger_Software.eXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
712940BAEF78C821E36B8701BF073C52.exetaskeng.exedescription pid process target process PID 2372 wrote to memory of 2816 2372 712940BAEF78C821E36B8701BF073C52.exe SCHtAsKs.EXe PID 2372 wrote to memory of 2816 2372 712940BAEF78C821E36B8701BF073C52.exe SCHtAsKs.EXe PID 2372 wrote to memory of 2816 2372 712940BAEF78C821E36B8701BF073C52.exe SCHtAsKs.EXe PID 2372 wrote to memory of 2816 2372 712940BAEF78C821E36B8701BF073C52.exe SCHtAsKs.EXe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2372 wrote to memory of 2724 2372 712940BAEF78C821E36B8701BF073C52.exe aspnet_compiler.exe PID 2796 wrote to memory of 2900 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 2900 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 2900 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 2900 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 1432 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 1432 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 1432 2796 taskeng.exe Accounts_Ledger_Software.eXE PID 2796 wrote to memory of 1432 2796 taskeng.exe Accounts_Ledger_Software.eXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\712940BAEF78C821E36B8701BF073C52.exe"C:\Users\Admin\AppData\Local\Temp\712940BAEF78C821E36B8701BF073C52.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\SCHtAsKs.EXe"SCHtAsKs.EXe" /create /tn WindowsUpdates833481094 /tr "C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE" /st 09:37 /du 9999:59 /sc daily /ri 1 /f /RL HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {559638E5-9D6D-478A-BDB8-A5FB20F6D7A4} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXEC:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXEC:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXEFilesize
91KB
MD5712940baef78c821e36b8701bf073c52
SHA1d59896b87424fafc0d00ab5e5c2019bd941167ce
SHA25608f8498aec75418bb4c12972a6547ee2c4762160e7bf36c558a91b7b9110ed3f
SHA51268bc6df413e00e6420ee6db6e4d0497bab61908b96f48fdb6bf6aae9bed72de840d83dfc0017dd24995a05f29b415b82852f84e9b74de85d303b67cc396c7007
-
memory/1432-42-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/1432-40-0x0000000001220000-0x000000000123A000-memory.dmpFilesize
104KB
-
memory/1432-41-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2372-13-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2372-1-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2372-2-0x0000000004C20000-0x0000000004C60000-memory.dmpFilesize
256KB
-
memory/2372-4-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/2372-0-0x0000000001130000-0x000000000114A000-memory.dmpFilesize
104KB
-
memory/2724-16-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-32-0x0000000004B60000-0x0000000004BA0000-memory.dmpFilesize
256KB
-
memory/2724-14-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2724-17-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2724-18-0x0000000004B60000-0x0000000004BA0000-memory.dmpFilesize
256KB
-
memory/2724-31-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2724-11-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-8-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-6-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2724-7-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2900-37-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2900-36-0x0000000074150000-0x000000007483E000-memory.dmpFilesize
6.9MB
-
memory/2900-35-0x00000000002F0000-0x000000000030A000-memory.dmpFilesize
104KB