Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 00:33
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240508-en
General
-
Target
Client.exe
-
Size
47KB
-
MD5
29aec1e80d556ddaea848196398fcc85
-
SHA1
efd928f0c29ea9ec9790797f544e730796e431f2
-
SHA256
d494670dad941c5f2f58a3ba4e6a5dfb2eb70265a14ef02db2937c8d679086eb
-
SHA512
75b811b4251f568dcd0cb4a6bb22c67475d979b2f54a729b44ea2d09cefc4894dbc80bcbdf0b9238fc4a3c357e8d675d8453084a620e94e47175f29915dae79c
-
SSDEEP
768:H3QgrILqiGm+LiAtelDSN+iV08YbygeHxQRSR31ybvEgK/JTRVc6KN:H39qAtKDs4zb1Cxp3KnkJTRVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:22
127.0.0.1:23
ilovabby.ddns.net:8848
ilovabby.ddns.net:22
ilovabby.ddns.net:23
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
Windowsupdate.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012263-14.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2708 Windowsupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2684 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe 2708 Windowsupdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2180 Client.exe Token: SeDebugPrivilege 2708 Windowsupdate.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2944 2180 Client.exe 29 PID 2180 wrote to memory of 2944 2180 Client.exe 29 PID 2180 wrote to memory of 2944 2180 Client.exe 29 PID 2180 wrote to memory of 1152 2180 Client.exe 31 PID 2180 wrote to memory of 1152 2180 Client.exe 31 PID 2180 wrote to memory of 1152 2180 Client.exe 31 PID 2944 wrote to memory of 2404 2944 cmd.exe 33 PID 2944 wrote to memory of 2404 2944 cmd.exe 33 PID 2944 wrote to memory of 2404 2944 cmd.exe 33 PID 1152 wrote to memory of 2684 1152 cmd.exe 34 PID 1152 wrote to memory of 2684 1152 cmd.exe 34 PID 1152 wrote to memory of 2684 1152 cmd.exe 34 PID 1152 wrote to memory of 2708 1152 cmd.exe 35 PID 1152 wrote to memory of 2708 1152 cmd.exe 35 PID 1152 wrote to memory of 2708 1152 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windowsupdate" /tr '"C:\Users\Admin\AppData\Roaming\Windowsupdate.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windowsupdate" /tr '"C:\Users\Admin\AppData\Roaming\Windowsupdate.exe"'3⤵
- Creates scheduled task(s)
PID:2404
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2137.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\Windowsupdate.exe"C:\Users\Admin\AppData\Roaming\Windowsupdate.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5bcbf0c6c62fc7c5f1425ae00c7ce4e22
SHA15063f08186faebaf6a6d069961d29a3ae46d2f74
SHA25643f1aa320d92fe412a107b738d33e8db532663f6b7624a6151cdfe0fce782150
SHA51219f2e9776de449c0cc0f9602d674df82ff7420cc296e56b0961fc0e7c1a6d1278e9be1149e160c319a6ffed11f25ffea69ba1f2a7420a7763d8b9703b671c5bc
-
Filesize
47KB
MD529aec1e80d556ddaea848196398fcc85
SHA1efd928f0c29ea9ec9790797f544e730796e431f2
SHA256d494670dad941c5f2f58a3ba4e6a5dfb2eb70265a14ef02db2937c8d679086eb
SHA51275b811b4251f568dcd0cb4a6bb22c67475d979b2f54a729b44ea2d09cefc4894dbc80bcbdf0b9238fc4a3c357e8d675d8453084a620e94e47175f29915dae79c