Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
3b3329be5d126e62ea8d68e39c4b31ef.exe
Resource
win7-20240215-en
General
-
Target
3b3329be5d126e62ea8d68e39c4b31ef.exe
-
Size
339KB
-
MD5
3b3329be5d126e62ea8d68e39c4b31ef
-
SHA1
18c7b121b0b4a303ad797374a1bbc6756364379c
-
SHA256
c1b1fabf3da9baf3d63792802c211736dcc8f398ec4d59045284f75cb3d7d49c
-
SHA512
70079c6e87e7a7e1754c8ea5848f06dc4512226fd87a5b677716e41844ac0ba2bda81e6885ad3555b3ed2432ac3830e427564d09d41dd1ec3d27a7c3eb77d02a
-
SSDEEP
6144:UukEhlxtM+hkmVvIF9OLTulOuVIYfeVrwGZy50uSvOKaxuAyEOEFMy0:U5utTx+s+50u/KmuAagr
Malware Config
Extracted
asyncrat
AWS | 3Losh
neq
goodone.loseyourip.com:6606
goodone.loseyourip.com:7707
goodone.loseyourip.com:8808
AsyncMutex_adnocxxs
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exedescription pid process target process PID 2348 set thread context of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegAsm.exepid process 2628 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe Token: SeDebugPrivilege 2628 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2628 RegAsm.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exedescription pid process target process PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2628 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 2348 wrote to memory of 2720 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe schtasks.exe PID 2348 wrote to memory of 2720 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe schtasks.exe PID 2348 wrote to memory of 2720 2348 3b3329be5d126e62ea8d68e39c4b31ef.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b3329be5d126e62ea8d68e39c4b31ef.exe"C:\Users\Admin\AppData\Local\Temp\3b3329be5d126e62ea8d68e39c4b31ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Windows\system32\schtasks.exe"schtasks.exe" /Create /SC MINUTE /MO 14 /TN "DivideShift" /TR "C:\Users\Admin\AppData\Roaming\Ex32_Sequence\3b3329be5d126e62ea8d68e39c4b31ef.exe" /F2⤵
- Creates scheduled task(s)
PID:2720