Analysis Overview
SHA256
c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542
Threat Level: Known bad
The file c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542 was found to be: Known bad.
Malicious Activity Summary
Asyncrat family
Async RAT payload
AsyncRat
Checks computer location settings
Unsigned PE
Enumerates physical storage devices
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Suspicious use of AdjustPrivilegeToken
Delays execution with timeout.exe
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-14 11:14
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-14 11:14
Reported
2024-06-14 11:17
Platform
win7-20240508-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
AsyncRat
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe
"C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "İp chenger açıldı" /tr '"C:\Users\Admin\AppData\Roaming\İp chenger açıldı.exe"' & exit
C:\Windows\system32\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp24A0.tmp.bat""
C:\Windows\system32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "İp chenger açıldı" /tr '"C:\Users\Admin\AppData\Roaming\İp chenger açıldı.exe"'
C:\Windows\system32\timeout.exe
timeout 3
Network
Files
memory/2244-0-0x000007FEF5623000-0x000007FEF5624000-memory.dmp
memory/2244-1-0x00000000003F0000-0x0000000000408000-memory.dmp
memory/2244-3-0x000007FEF5620000-0x000007FEF600C000-memory.dmp
memory/2244-11-0x000007FEF5620000-0x000007FEF600C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp24A0.tmp.bat
| MD5 | 37d72d44e2e36d824badc7f38f0c4887 |
| SHA1 | b74a6ebe0b40fb669429b93606e7d82e0ab82ea4 |
| SHA256 | 060886f8463fc804d0ba5b2ad8242b69f2494fb06b3c84ba6532d093c8941ff6 |
| SHA512 | 7736f9e68d92e8d003658b8d607d57d97eca320801ba5ffe4ca4e7ca802a159967988a1d6cea668ee1cda56a082aa8f0ce39afca02210bb2e61a4e900f88ac8a |
memory/2244-13-0x000007FEF5620000-0x000007FEF600C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-14 11:14
Reported
2024-06-14 11:17
Platform
win10v2004-20240611-en
Max time kernel
94s
Max time network
97s
Command Line
Signatures
AsyncRat
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe
"C:\Users\Admin\AppData\Local\Temp\c1c822c4fa3f7a306d16f527268b52d47f93f86861c6dea37306bce0fbb38542.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "İp chenger açıldı" /tr '"C:\Users\Admin\AppData\Roaming\İp chenger açıldı.exe"' & exit
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp516C.tmp.bat""
C:\Windows\system32\timeout.exe
timeout 3
C:\Windows\system32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "İp chenger açıldı" /tr '"C:\Users\Admin\AppData\Roaming\İp chenger açıldı.exe"'
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
Files
memory/3272-0-0x00007FFE378C3000-0x00007FFE378C5000-memory.dmp
memory/3272-1-0x0000000000070000-0x0000000000088000-memory.dmp
memory/3272-3-0x00007FFE378C0000-0x00007FFE38381000-memory.dmp
memory/3272-8-0x00007FFE378C0000-0x00007FFE38381000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp516C.tmp.bat
| MD5 | 2703b23dfed2ebb90c7dde95fd6eb08a |
| SHA1 | e1c92b8475f3771c52ffe413211c8e40301f82ad |
| SHA256 | b635a251ef5bd3b232d35be4105d522bd97430307bee4f144229ef02aaa0c7c3 |
| SHA512 | 6784c8b58c3d569f9b73f55ab8573b87988ec66b05195ae3e119e55a7440f699e2b92481aebc74018d2e425e7adfef6586f7fbb1eac3c3997e604f3b571110e2 |