Overview
overview
10Static
static
10a ton of c...0).exe
windows11-21h2-x64
10a ton of c...1).exe
windows11-21h2-x64
10a ton of c...2).exe
windows11-21h2-x64
10a ton of c...3).exe
windows11-21h2-x64
10a ton of c...4).exe
windows11-21h2-x64
10a ton of c...5).exe
windows11-21h2-x64
10a ton of c...6).exe
windows11-21h2-x64
10a ton of c...7).exe
windows11-21h2-x64
10a ton of c...8).exe
windows11-21h2-x64
10a ton of c...9).exe
windows11-21h2-x64
10a ton of c...2).exe
windows11-21h2-x64
10a ton of c...0).exe
windows11-21h2-x64
10a ton of c...1).exe
windows11-21h2-x64
10a ton of c...2).exe
windows11-21h2-x64
10a ton of c...3).exe
windows11-21h2-x64
10a ton of c...4).exe
windows11-21h2-x64
10a ton of c...5).exe
windows11-21h2-x64
10a ton of c...6).exe
windows11-21h2-x64
10a ton of c...7).exe
windows11-21h2-x64
10a ton of c...8).exe
windows11-21h2-x64
10a ton of c...9).exe
windows11-21h2-x64
10a ton of c...3).exe
windows11-21h2-x64
10a ton of c...0).exe
windows11-21h2-x64
10a ton of c...1).exe
windows11-21h2-x64
10a ton of c...4).exe
windows11-21h2-x64
10a ton of c...5).exe
windows11-21h2-x64
10a ton of c...6).exe
windows11-21h2-x64
10a ton of c...7).exe
windows11-21h2-x64
10a ton of c...8).exe
windows11-21h2-x64
10a ton of c...9).exe
windows11-21h2-x64
10a ton of c...py.exe
windows11-21h2-x64
10a ton of c...me.exe
windows11-21h2-x64
10Analysis
-
max time kernel
453s -
max time network
1195s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/05/2024, 01:36
Behavioral task
behavioral1
Sample
a ton of cumme/cumme - Copy (10).exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
a ton of cumme/cumme - Copy (11).exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
a ton of cumme/cumme - Copy (12).exe
Resource
win11-20240419-en
Behavioral task
behavioral4
Sample
a ton of cumme/cumme - Copy (13).exe
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
a ton of cumme/cumme - Copy (14).exe
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
a ton of cumme/cumme - Copy (15).exe
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
a ton of cumme/cumme - Copy (16).exe
Resource
win11-20240419-en
Behavioral task
behavioral8
Sample
a ton of cumme/cumme - Copy (17).exe
Resource
win11-20240419-en
Behavioral task
behavioral9
Sample
a ton of cumme/cumme - Copy (18).exe
Resource
win11-20240419-en
Behavioral task
behavioral10
Sample
a ton of cumme/cumme - Copy (19).exe
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
a ton of cumme/cumme - Copy (2).exe
Resource
win11-20240419-en
Behavioral task
behavioral12
Sample
a ton of cumme/cumme - Copy (20).exe
Resource
win11-20240419-en
Behavioral task
behavioral13
Sample
a ton of cumme/cumme - Copy (21).exe
Resource
win11-20240426-en
Behavioral task
behavioral14
Sample
a ton of cumme/cumme - Copy (22).exe
Resource
win11-20240426-en
Behavioral task
behavioral15
Sample
a ton of cumme/cumme - Copy (23).exe
Resource
win11-20240426-en
Behavioral task
behavioral16
Sample
a ton of cumme/cumme - Copy (24).exe
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
a ton of cumme/cumme - Copy (25).exe
Resource
win11-20240426-en
Behavioral task
behavioral18
Sample
a ton of cumme/cumme - Copy (26).exe
Resource
win11-20240426-en
Behavioral task
behavioral19
Sample
a ton of cumme/cumme - Copy (27).exe
Resource
win11-20240419-en
Behavioral task
behavioral20
Sample
a ton of cumme/cumme - Copy (28).exe
Resource
win11-20240426-en
Behavioral task
behavioral21
Sample
a ton of cumme/cumme - Copy (29).exe
Resource
win11-20240426-en
Behavioral task
behavioral22
Sample
a ton of cumme/cumme - Copy (3).exe
Resource
win11-20240426-en
Behavioral task
behavioral23
Sample
a ton of cumme/cumme - Copy (30).exe
Resource
win11-20240419-en
Behavioral task
behavioral24
Sample
a ton of cumme/cumme - Copy (31).exe
Resource
win11-20240419-en
Behavioral task
behavioral25
Sample
a ton of cumme/cumme - Copy (4).exe
Resource
win11-20240426-en
Behavioral task
behavioral26
Sample
a ton of cumme/cumme - Copy (5).exe
Resource
win11-20240419-en
Behavioral task
behavioral27
Sample
a ton of cumme/cumme - Copy (6).exe
Resource
win11-20240419-en
Behavioral task
behavioral28
Sample
a ton of cumme/cumme - Copy (7).exe
Resource
win11-20240419-en
Behavioral task
behavioral29
Sample
a ton of cumme/cumme - Copy (8).exe
Resource
win11-20240419-en
Behavioral task
behavioral30
Sample
a ton of cumme/cumme - Copy (9).exe
Resource
win11-20240419-en
Behavioral task
behavioral31
Sample
a ton of cumme/cumme - Copy.exe
Resource
win11-20240419-en
General
-
Target
a ton of cumme/cumme - Copy (4).exe
-
Size
63KB
-
MD5
76034e5a2c3a49ec8232f011d5572d84
-
SHA1
9dae727f33662a0411fb0f49a51c845fddbb5b98
-
SHA256
390f2329d720595861f5bc5bf65cccdd0a76639197f15fb1529e66736a6f6a41
-
SHA512
df4a742d9f5da89888a154f4eef3964bf5574f4d679088aa03fc58e8309f06ea942ea291fa2acd87e92c922c59845c1b695d9dd736e3f7b99316c08dd6968a1d
-
SSDEEP
1536:AqTQa7NVNPHYUYUbzh97IBfusdpqKmY7:A5ANVHYUbz3kJGz
Malware Config
Extracted
asyncrat
Default
other-fellow.gl.at.ply.gg:42571
-
delay
1
-
install
true
-
install_file
cumme.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral25/files/0x000400000002a9a5-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 432 cumme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4872 timeout.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe 4904 cumme - Copy (4).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4904 cumme - Copy (4).exe Token: SeDebugPrivilege 432 cumme.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1216 4904 cumme - Copy (4).exe 82 PID 4904 wrote to memory of 1216 4904 cumme - Copy (4).exe 82 PID 4904 wrote to memory of 4796 4904 cumme - Copy (4).exe 84 PID 4904 wrote to memory of 4796 4904 cumme - Copy (4).exe 84 PID 1216 wrote to memory of 4424 1216 cmd.exe 86 PID 1216 wrote to memory of 4424 1216 cmd.exe 86 PID 4796 wrote to memory of 4872 4796 cmd.exe 87 PID 4796 wrote to memory of 4872 4796 cmd.exe 87 PID 4796 wrote to memory of 432 4796 cmd.exe 88 PID 4796 wrote to memory of 432 4796 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a ton of cumme\cumme - Copy (4).exe"C:\Users\Admin\AppData\Local\Temp\a ton of cumme\cumme - Copy (4).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "cumme" /tr '"C:\Users\Admin\AppData\Roaming\cumme.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "cumme" /tr '"C:\Users\Admin\AppData\Roaming\cumme.exe"'3⤵
- Creates scheduled task(s)
PID:4424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4A57.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4872
-
-
C:\Users\Admin\AppData\Roaming\cumme.exe"C:\Users\Admin\AppData\Roaming\cumme.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD51fd1fa0b4285f869ae5fa1dafae0a96e
SHA1faa782719764d65c53a6bb07445ec73aa1051d70
SHA2566a658be41ed3b6a206d3cbbff79a8fb1cc618249f744530f730b471cf4e8a81b
SHA512c56a030f06dd2b92b21b3482294ecfef0e0d9d0823722963da7720c9f585e54bc35c9c25f3632f5efa96e18f7f668e0c421256743235ae7c9f299ff0d2afdb97
-
Filesize
63KB
MD576034e5a2c3a49ec8232f011d5572d84
SHA19dae727f33662a0411fb0f49a51c845fddbb5b98
SHA256390f2329d720595861f5bc5bf65cccdd0a76639197f15fb1529e66736a6f6a41
SHA512df4a742d9f5da89888a154f4eef3964bf5574f4d679088aa03fc58e8309f06ea942ea291fa2acd87e92c922c59845c1b695d9dd736e3f7b99316c08dd6968a1d