Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
3b3329be5d126e62ea8d68e39c4b31ef.exe
Resource
win7-20240215-en
General
-
Target
3b3329be5d126e62ea8d68e39c4b31ef.exe
-
Size
339KB
-
MD5
3b3329be5d126e62ea8d68e39c4b31ef
-
SHA1
18c7b121b0b4a303ad797374a1bbc6756364379c
-
SHA256
c1b1fabf3da9baf3d63792802c211736dcc8f398ec4d59045284f75cb3d7d49c
-
SHA512
70079c6e87e7a7e1754c8ea5848f06dc4512226fd87a5b677716e41844ac0ba2bda81e6885ad3555b3ed2432ac3830e427564d09d41dd1ec3d27a7c3eb77d02a
-
SSDEEP
6144:UukEhlxtM+hkmVvIF9OLTulOuVIYfeVrwGZy50uSvOKaxuAyEOEFMy0:U5utTx+s+50u/KmuAagr
Malware Config
Extracted
asyncrat
AWS | 3Losh
neq
goodone.loseyourip.com:6606
goodone.loseyourip.com:7707
goodone.loseyourip.com:8808
AsyncMutex_adnocxxs
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exedescription pid process target process PID 3120 set thread context of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exeRegAsm.exepid process 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe 4264 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe Token: SeDebugPrivilege 4264 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 4264 RegAsm.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
3b3329be5d126e62ea8d68e39c4b31ef.exedescription pid process target process PID 3120 wrote to memory of 3568 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 3568 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 3568 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 4264 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe RegAsm.exe PID 3120 wrote to memory of 3944 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe schtasks.exe PID 3120 wrote to memory of 3944 3120 3b3329be5d126e62ea8d68e39c4b31ef.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b3329be5d126e62ea8d68e39c4b31ef.exe"C:\Users\Admin\AppData\Local\Temp\3b3329be5d126e62ea8d68e39c4b31ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3568
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4264 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC MINUTE /MO 14 /TN "DivideShift" /TR "C:\Users\Admin\AppData\Roaming\Ex32_Sequence\3b3329be5d126e62ea8d68e39c4b31ef.exe" /F2⤵
- Creates scheduled task(s)
PID:3944