Analysis
-
max time kernel
117s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
a5565d3428290bfc6c4a9bcca68c15ea.exe
Resource
win7-20240221-en
General
-
Target
a5565d3428290bfc6c4a9bcca68c15ea.exe
-
Size
937KB
-
MD5
a5565d3428290bfc6c4a9bcca68c15ea
-
SHA1
28797c12ca5450fc854f773fb0c42414c0229fa8
-
SHA256
894a90bbfcbd16442d3b117f6b391c1f22b72d1aebafd0ff51a60df08b1e434d
-
SHA512
699f9c7266fc24b78bd44d026f7c4c98e613cde7b5d32efefa65dec1706ffac4f266b712760891cb45bcf6fae96880e9ce9b3246056778e78d682e32b333d7e4
-
SSDEEP
24576:uboifHo7t2xklCohhwbfIWyQZD/Og34dK:ubxfel3hyf1
Malware Config
Extracted
asyncrat
AWS | 3Losh
neq
goodone.loseyourip.com:6606
goodone.loseyourip.com:7707
goodone.loseyourip.com:8808
AsyncMutex_adnocxxs
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exedescription pid process target process PID 1524 set thread context of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exeRegAsm.exepid process 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe 2612 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe Token: SeDebugPrivilege 2612 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2612 RegAsm.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exedescription pid process target process PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2548 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2556 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2592 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2612 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1524 wrote to memory of 2412 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe PID 1524 wrote to memory of 2412 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe PID 1524 wrote to memory of 2412 1524 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5565d3428290bfc6c4a9bcca68c15ea.exe"C:\Users\Admin\AppData\Local\Temp\a5565d3428290bfc6c4a9bcca68c15ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /Create /SC MINUTE /MO 14 /TN "AppTracker" /TR "C:\Users\Admin\AppData\Roaming\Ex64_Seeders\a5565d3428290bfc6c4a9bcca68c15ea.exe" /F2⤵
- Creates scheduled task(s)
PID:2412
-