Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240508-en
General
-
Target
sample.exe
-
Size
407KB
-
MD5
3de308db811bdd3781a51a313d6d179f
-
SHA1
0118e47f8bd38d3ed43cfed441f7047938490cf8
-
SHA256
7778fbb8ef5a6e0948d5135dc4dc9136cb16a56d6ac933f72ae66aef7151d989
-
SHA512
07a1b4f088b4aef42eed545b2f836d1a1f97a418e532ef69d4b68e1a8fa9cf9b8fa1dbf97c8fa9b9a9230555a2193881d746f529ef17ddc6b65d499d09100b49
-
SSDEEP
6144:jRwuOnmWW0hQAYRc0ZL8uOQIbY7aSzHA39GMQNe5TdjXmGWpWX2/iE:+mX0fYW0ZLxZGY7aSMsLNeBVmrj
Malware Config
Extracted
asyncrat
0.5.7B
Default
54.75.82.184:7206
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe\"" sample.exe -
Drops startup file 2 IoCs
Processes:
sample.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample.exe sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample.exe sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\sample.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe" sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
sample.exepid process 2240 sample.exe 2240 sample.exe 2240 sample.exe 2240 sample.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sample.exedescription pid process target process PID 2240 set thread context of 2904 2240 sample.exe sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
sample.exepid process 2240 sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 2240 sample.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
sample.exedescription pid process target process PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe PID 2240 wrote to memory of 2904 2240 sample.exe sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵PID:2904
-