Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240508-en
General
-
Target
sample.exe
-
Size
407KB
-
MD5
3de308db811bdd3781a51a313d6d179f
-
SHA1
0118e47f8bd38d3ed43cfed441f7047938490cf8
-
SHA256
7778fbb8ef5a6e0948d5135dc4dc9136cb16a56d6ac933f72ae66aef7151d989
-
SHA512
07a1b4f088b4aef42eed545b2f836d1a1f97a418e532ef69d4b68e1a8fa9cf9b8fa1dbf97c8fa9b9a9230555a2193881d746f529ef17ddc6b65d499d09100b49
-
SSDEEP
6144:jRwuOnmWW0hQAYRc0ZL8uOQIbY7aSzHA39GMQNe5TdjXmGWpWX2/iE:+mX0fYW0ZLxZGY7aSMsLNeBVmrj
Malware Config
Extracted
asyncrat
0.5.7B
Default
54.75.82.184:7206
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe\"" sample.exe -
Drops startup file 2 IoCs
Processes:
sample.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample.exe sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample.exe sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sample.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe" sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
sample.exepid process 3916 sample.exe 3916 sample.exe 3916 sample.exe 3916 sample.exe 3916 sample.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sample.exedescription pid process target process PID 3916 set thread context of 5040 3916 sample.exe sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
sample.exepid process 3916 sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 3916 sample.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
sample.exedescription pid process target process PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe PID 3916 wrote to memory of 5040 3916 sample.exe sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
617B
MD599e770c0d4043aa84ef3d3cbc7723c25
SHA119829c5c413fccba750a3357f938dfa94486acad
SHA25633c7dd4c852dae6462c701337f8e0a8647602847ccaee656fa6f1149cccfb5d5
SHA512ba521e2f57d7e1db19445201948caa7af6d953e1c1340228934888f8ec05b8984ad492122d0bf0550b5e679614d8a713ecf68f91916ffa6e5d8f75bf003aae39