Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
a5565d3428290bfc6c4a9bcca68c15ea.exe
Resource
win7-20240508-en
General
-
Target
a5565d3428290bfc6c4a9bcca68c15ea.exe
-
Size
937KB
-
MD5
a5565d3428290bfc6c4a9bcca68c15ea
-
SHA1
28797c12ca5450fc854f773fb0c42414c0229fa8
-
SHA256
894a90bbfcbd16442d3b117f6b391c1f22b72d1aebafd0ff51a60df08b1e434d
-
SHA512
699f9c7266fc24b78bd44d026f7c4c98e613cde7b5d32efefa65dec1706ffac4f266b712760891cb45bcf6fae96880e9ce9b3246056778e78d682e32b333d7e4
-
SSDEEP
24576:uboifHo7t2xklCohhwbfIWyQZD/Og34dK:ubxfel3hyf1
Malware Config
Extracted
asyncrat
AWS | 3Losh
neq
goodone.loseyourip.com:6606
goodone.loseyourip.com:7707
goodone.loseyourip.com:8808
AsyncMutex_adnocxxs
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exedescription pid process target process PID 1740 set thread context of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegAsm.exepid process 3060 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe Token: SeDebugPrivilege 3060 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 3060 RegAsm.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a5565d3428290bfc6c4a9bcca68c15ea.exedescription pid process target process PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 3060 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe RegAsm.exe PID 1740 wrote to memory of 2604 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe PID 1740 wrote to memory of 2604 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe PID 1740 wrote to memory of 2604 1740 a5565d3428290bfc6c4a9bcca68c15ea.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5565d3428290bfc6c4a9bcca68c15ea.exe"C:\Users\Admin\AppData\Local\Temp\a5565d3428290bfc6c4a9bcca68c15ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /Create /SC MINUTE /MO 14 /TN "AppTracker" /TR "C:\Users\Admin\AppData\Roaming\Ex64_Seeders\a5565d3428290bfc6c4a9bcca68c15ea.exe" /F2⤵
- Creates scheduled task(s)
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa