Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 11:57
Behavioral task
behavioral1
Sample
Optimix_client.exe
Resource
win7-20240221-en
General
-
Target
Optimix_client.exe
-
Size
45KB
-
MD5
bc9efb1b76331a392346d4cce9c3b177
-
SHA1
ecd6d5584ab75f5735a69864ecf74dddde8683a1
-
SHA256
d948a6af0e9a1e9981669d300da54d84e526fc55e9654b8de1ba58821e14b96b
-
SHA512
4969259be841c308d791c16d0645e8f72db3f8708975bd9682ae630cca4c8f27b778d48387b5f17f1a1d82f3b8392cfbe95f8d5cd860ad25543f0d520e6b3f19
-
SSDEEP
768:luAINTHkvSbWUnFKJmo2q7XIrzXIxOPILzjbjXgXAiHFeq1BDZPx:luAINTHgN2Lv83L3bEX9leqbdPx
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.0.76:6606
192.168.0.76:7707
192.168.0.76:8808
192.168.0.76:4444
YNGv5uoT0xzv
-
delay
3
-
install
true
-
install_file
ProtonyteAntiVirusSetup.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
ProtonyteAntiVirusSetup.exepid process 3032 ProtonyteAntiVirusSetup.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2636 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2640 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Optimix_client.exepid process 2212 Optimix_client.exe 2212 Optimix_client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Optimix_client.exeProtonyteAntiVirusSetup.exedescription pid process Token: SeDebugPrivilege 2212 Optimix_client.exe Token: SeDebugPrivilege 3032 ProtonyteAntiVirusSetup.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
Optimix_client.execmd.execmd.exedescription pid process target process PID 2212 wrote to memory of 2736 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2736 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2736 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2736 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2636 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2636 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2636 2212 Optimix_client.exe cmd.exe PID 2212 wrote to memory of 2636 2212 Optimix_client.exe cmd.exe PID 2736 wrote to memory of 2704 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2704 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2704 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2704 2736 cmd.exe schtasks.exe PID 2636 wrote to memory of 2640 2636 cmd.exe timeout.exe PID 2636 wrote to memory of 2640 2636 cmd.exe timeout.exe PID 2636 wrote to memory of 2640 2636 cmd.exe timeout.exe PID 2636 wrote to memory of 2640 2636 cmd.exe timeout.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe PID 2636 wrote to memory of 3032 2636 cmd.exe ProtonyteAntiVirusSetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Optimix_client.exe"C:\Users\Admin\AppData\Local\Temp\Optimix_client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ProtonyteAntiVirusSetup" /tr '"C:\Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ProtonyteAntiVirusSetup" /tr '"C:\Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2E32.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exe"C:\Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp2E32.tmp.batFilesize
170B
MD5bb1d8bae623a64a20c7a95a758fea8b7
SHA1fa690bc95bb16ec3d5b45d1eb673a6d59b143848
SHA256aa950c991e228c674a45881547a3376a677e382b767eae4a1dd8aefeec98c6be
SHA5125fed89702abfe86b02f2cce34cdebe01cd319ed25324308e42be9e6b6d61fd9fb786eb358b34dca29778e249b66c7020acc9ea01b205b3063c258588fa01717d
-
\Users\Admin\AppData\Local\Temp\ProtonyteAntiVirusSetup.exeFilesize
45KB
MD5bc9efb1b76331a392346d4cce9c3b177
SHA1ecd6d5584ab75f5735a69864ecf74dddde8683a1
SHA256d948a6af0e9a1e9981669d300da54d84e526fc55e9654b8de1ba58821e14b96b
SHA5124969259be841c308d791c16d0645e8f72db3f8708975bd9682ae630cca4c8f27b778d48387b5f17f1a1d82f3b8392cfbe95f8d5cd860ad25543f0d520e6b3f19
-
memory/2212-0-0x00000000745DE000-0x00000000745DF000-memory.dmpFilesize
4KB
-
memory/2212-1-0x0000000000A10000-0x0000000000A22000-memory.dmpFilesize
72KB
-
memory/2212-2-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/2212-12-0x00000000745D0000-0x0000000074CBE000-memory.dmpFilesize
6.9MB
-
memory/3032-16-0x0000000000990000-0x00000000009A2000-memory.dmpFilesize
72KB