Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 19:35
Behavioral task
behavioral1
Sample
fixer.exe
Resource
win7-20240215-en
General
-
Target
fixer.exe
-
Size
49KB
-
MD5
041086a69579dc26514645814a4bba5c
-
SHA1
07c7bf2bf5953ba3369ab727ff8a06e93fc2ccfd
-
SHA256
c633b31880ac53ee6282c0d7a7daae5c9ecc024055de85b77a17ffe9be5ebe08
-
SHA512
07a18aa25f2b201613e26c5c50aef20b8d2d77b2a89ac983ee00d4ed223f6dbdec424b673735baa22b76d6fb31367de912ad56e8066c8e470bcb886e1959dd77
-
SSDEEP
768:aBxKJlVRLxt5A0fjXiqVNcr4Lp2FimUbgCxB/yzuoxGZkpqKYhY7:f37/jXi+L7NECvyzz4kpqKmY7
Malware Config
Extracted
asyncrat
Default
127.0.0.1:35259
147.185.221.19:35259
-
delay
1
-
install
true
-
install_file
MS_EDGE_TEMP_.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3024-1-0x0000000000270000-0x0000000000286000-memory.dmp family_asyncrat behavioral1/files/0x000a000000012252-17.dat family_asyncrat behavioral1/memory/2584-20-0x0000000000240000-0x0000000000256000-memory.dmp family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2584 MS_EDGE_TEMP_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2652 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3024 fixer.exe 3024 fixer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3024 fixer.exe Token: SeDebugPrivilege 2584 MS_EDGE_TEMP_.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1708 3024 fixer.exe 28 PID 3024 wrote to memory of 1708 3024 fixer.exe 28 PID 3024 wrote to memory of 1708 3024 fixer.exe 28 PID 3024 wrote to memory of 3060 3024 fixer.exe 30 PID 3024 wrote to memory of 3060 3024 fixer.exe 30 PID 3024 wrote to memory of 3060 3024 fixer.exe 30 PID 1708 wrote to memory of 2660 1708 cmd.exe 32 PID 1708 wrote to memory of 2660 1708 cmd.exe 32 PID 1708 wrote to memory of 2660 1708 cmd.exe 32 PID 3060 wrote to memory of 2652 3060 cmd.exe 33 PID 3060 wrote to memory of 2652 3060 cmd.exe 33 PID 3060 wrote to memory of 2652 3060 cmd.exe 33 PID 3060 wrote to memory of 2584 3060 cmd.exe 34 PID 3060 wrote to memory of 2584 3060 cmd.exe 34 PID 3060 wrote to memory of 2584 3060 cmd.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fixer.exe"C:\Users\Admin\AppData\Local\Temp\fixer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MS_EDGE_TEMP_" /tr '"C:\Users\Admin\AppData\Roaming\MS_EDGE_TEMP_.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MS_EDGE_TEMP_" /tr '"C:\Users\Admin\AppData\Roaming\MS_EDGE_TEMP_.exe"'3⤵
- Creates scheduled task(s)
PID:2660
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1BBB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2652
-
-
C:\Users\Admin\AppData\Roaming\MS_EDGE_TEMP_.exe"C:\Users\Admin\AppData\Roaming\MS_EDGE_TEMP_.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD582ffad58c36561944eddbe346aac035c
SHA14f4b228f4d1452b3e61d09d5751f811dac766376
SHA256034f972bde17f9dd2c1ff73ed7f77db94a3ed28f560b17499adfa1311c88d946
SHA512415e89f22deff7681b2e5a66c3db953057d221dd81c858dcefb7ec91a7d629fef70310fdd1df60e14c560ab6bb9f2f5eecde0d500a944c21c701b21c1b8eb52c
-
Filesize
49KB
MD5041086a69579dc26514645814a4bba5c
SHA107c7bf2bf5953ba3369ab727ff8a06e93fc2ccfd
SHA256c633b31880ac53ee6282c0d7a7daae5c9ecc024055de85b77a17ffe9be5ebe08
SHA51207a18aa25f2b201613e26c5c50aef20b8d2d77b2a89ac983ee00d4ed223f6dbdec424b673735baa22b76d6fb31367de912ad56e8066c8e470bcb886e1959dd77