Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
Resource
win10v2004-20240508-en
General
-
Target
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
-
Size
2.7MB
-
MD5
35e31d508c28c89153ef55ffe8c8ba53
-
SHA1
c74bd105dcac27193f9b432a8a45719b5bb60de1
-
SHA256
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1
-
SHA512
9a953f9ea56fdf5858fda761d3e44bc825a33f489b2a2d09aff438f94eae0e299cc15280b9c716024319d153e872e9e5449f47d0ce8bcec7e07f635590c511b0
-
SSDEEP
49152:xiv9XkAV5nN1nCz+QBprbMG8zFOnRPXXeqwlG9nFRW7NMJwBgJT:sVR5d2+OpMGtRvezliGCGBgt
Malware Config
Extracted
asyncrat
0.5.8
Default
95.211.208.153:6606
95.211.208.153:7707
95.211.208.153:8808
5512.sytes.net:6606
5512.sytes.net:7707
5512.sytes.net:8808
Llg9a02PERRO
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Zcsbaibfhun.exeLicGen.exepid process 3068 Zcsbaibfhun.exe 2680 LicGen.exe -
Loads dropped DLL 2 IoCs
Processes:
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exepid process 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Zcsbaibfhun.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Duyiyilycdc = "C:\\Users\\Admin\\AppData\\Roaming\\Duyiyilycdc.exe" Zcsbaibfhun.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Zcsbaibfhun.exedescription pid process target process PID 3068 set thread context of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeZcsbaibfhun.exedescription pid process Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 3068 Zcsbaibfhun.exe Token: SeDebugPrivilege 3068 Zcsbaibfhun.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exeZcsbaibfhun.exedescription pid process target process PID 1636 wrote to memory of 2788 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1636 wrote to memory of 2788 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1636 wrote to memory of 2788 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1636 wrote to memory of 2788 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1636 wrote to memory of 3068 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1636 wrote to memory of 3068 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1636 wrote to memory of 3068 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1636 wrote to memory of 3068 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1636 wrote to memory of 2680 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 1636 wrote to memory of 2680 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 1636 wrote to memory of 2680 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 1636 wrote to memory of 2680 1636 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe PID 3068 wrote to memory of 1352 3068 Zcsbaibfhun.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe"C:\Users\Admin\AppData\Local\Temp\10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAYQB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAdgB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHcAcwB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHUAZABuACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\LicGen.exe"C:\Users\Admin\AppData\Local\Temp\LicGen.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\LicGen.exeFilesize
334KB
MD563404fb2f5a0d14e7a19fa3e4b8af577
SHA112d4ecfcfe8f9fa53fbc4f7addb43ab118da8255
SHA256d599ed299630b163afb1aa64f6f5bdd92969dd9abfca1e32d1df4a93608fefeb
SHA51219aae9580fa9be4c14401f144f04366a1c21cb9c9ae268a4e75f9e0364f49e9e18242ec0f49c7ec349328530b960b3890e1197d417db9986c763e098844e7416
-
\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exeFilesize
2.4MB
MD55870c41c149fdd038336b2a1b2103e2f
SHA1d3efce3cc94fb928113481aee8d58cdeea24a708
SHA2569b489f300c3797e9d343a47ecd96e83646a61b02c28b5e68071d26a5a666c929
SHA5129fdbc2281e54dc640e8b2598faedabffe70f3fc739d88a603c0d43a8496fc08b07fcebd63fabd11d69c3393edb28eec867ab505a5c694ebe17632d04fe8952a7
-
memory/1352-4922-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1636-12-0x0000000003150000-0x000000000322D000-memory.dmpFilesize
884KB
-
memory/2680-14-0x0000000000400000-0x00000000004DD000-memory.dmpFilesize
884KB
-
memory/2680-4925-0x0000000000400000-0x00000000004DD000-memory.dmpFilesize
884KB
-
memory/3068-49-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-57-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-25-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-23-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-21-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-20-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-29-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-31-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-33-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-35-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-37-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-39-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-41-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-43-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-45-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-47-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-19-0x0000000006290000-0x00000000064B2000-memory.dmpFilesize
2.1MB
-
memory/3068-53-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-55-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-27-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-61-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-65-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-67-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-71-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-75-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-81-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-51-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-4907-0x00000000047D0000-0x000000000481C000-memory.dmpFilesize
304KB
-
memory/3068-4906-0x0000000002060000-0x00000000020BC000-memory.dmpFilesize
368KB
-
memory/3068-83-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-79-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-77-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-73-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-69-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-63-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-59-0x0000000006290000-0x00000000064AC000-memory.dmpFilesize
2.1MB
-
memory/3068-4908-0x0000000004960000-0x00000000049B4000-memory.dmpFilesize
336KB
-
memory/3068-18-0x0000000004F40000-0x0000000005160000-memory.dmpFilesize
2.1MB
-
memory/3068-17-0x00000000001F0000-0x0000000000452000-memory.dmpFilesize
2.4MB