Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
Resource
win10v2004-20240508-en
General
-
Target
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe
-
Size
2.7MB
-
MD5
35e31d508c28c89153ef55ffe8c8ba53
-
SHA1
c74bd105dcac27193f9b432a8a45719b5bb60de1
-
SHA256
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1
-
SHA512
9a953f9ea56fdf5858fda761d3e44bc825a33f489b2a2d09aff438f94eae0e299cc15280b9c716024319d153e872e9e5449f47d0ce8bcec7e07f635590c511b0
-
SSDEEP
49152:xiv9XkAV5nN1nCz+QBprbMG8zFOnRPXXeqwlG9nFRW7NMJwBgJT:sVR5d2+OpMGtRvezliGCGBgt
Malware Config
Extracted
asyncrat
0.5.8
Default
95.211.208.153:6606
95.211.208.153:7707
95.211.208.153:8808
5512.sytes.net:6606
5512.sytes.net:7707
5512.sytes.net:8808
Llg9a02PERRO
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe -
Executes dropped EXE 2 IoCs
Processes:
Zcsbaibfhun.exeLicGen.exepid process 3592 Zcsbaibfhun.exe 4484 LicGen.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Zcsbaibfhun.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Duyiyilycdc = "C:\\Users\\Admin\\AppData\\Roaming\\Duyiyilycdc.exe" Zcsbaibfhun.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Zcsbaibfhun.exedescription pid process target process PID 3592 set thread context of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 212 powershell.exe 212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeZcsbaibfhun.exedescription pid process Token: SeDebugPrivilege 212 powershell.exe Token: SeDebugPrivilege 3592 Zcsbaibfhun.exe Token: SeDebugPrivilege 3592 Zcsbaibfhun.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exeZcsbaibfhun.exedescription pid process target process PID 1644 wrote to memory of 212 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1644 wrote to memory of 212 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1644 wrote to memory of 212 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe powershell.exe PID 1644 wrote to memory of 3592 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1644 wrote to memory of 3592 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1644 wrote to memory of 3592 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe Zcsbaibfhun.exe PID 1644 wrote to memory of 4484 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 1644 wrote to memory of 4484 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 1644 wrote to memory of 4484 1644 10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe LicGen.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe PID 3592 wrote to memory of 4224 3592 Zcsbaibfhun.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe"C:\Users\Admin\AppData\Local\Temp\10fe9e0b3b861a06727addb3e0291727bdd8cd91bebbed4b3d6bc901aa15dde1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAYQB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHoAdgB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHcAcwB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHUAZABuACMAPgA="2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\LicGen.exe"C:\Users\Admin\AppData\Local\Temp\LicGen.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\LicGen.exeFilesize
334KB
MD563404fb2f5a0d14e7a19fa3e4b8af577
SHA112d4ecfcfe8f9fa53fbc4f7addb43ab118da8255
SHA256d599ed299630b163afb1aa64f6f5bdd92969dd9abfca1e32d1df4a93608fefeb
SHA51219aae9580fa9be4c14401f144f04366a1c21cb9c9ae268a4e75f9e0364f49e9e18242ec0f49c7ec349328530b960b3890e1197d417db9986c763e098844e7416
-
C:\Users\Admin\AppData\Local\Temp\Zcsbaibfhun.exeFilesize
2.4MB
MD55870c41c149fdd038336b2a1b2103e2f
SHA1d3efce3cc94fb928113481aee8d58cdeea24a708
SHA2569b489f300c3797e9d343a47ecd96e83646a61b02c28b5e68071d26a5a666c929
SHA5129fdbc2281e54dc640e8b2598faedabffe70f3fc739d88a603c0d43a8496fc08b07fcebd63fabd11d69c3393edb28eec867ab505a5c694ebe17632d04fe8952a7
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1jfdyvr1.acq.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/212-31-0x0000000005910000-0x0000000005932000-memory.dmpFilesize
136KB
-
memory/212-4962-0x0000000073360000-0x0000000073B10000-memory.dmpFilesize
7.7MB
-
memory/212-4957-0x0000000007F60000-0x0000000007F68000-memory.dmpFilesize
32KB
-
memory/212-25-0x0000000005BC0000-0x00000000061E8000-memory.dmpFilesize
6.2MB
-
memory/212-4956-0x0000000007F70000-0x0000000007F8A000-memory.dmpFilesize
104KB
-
memory/212-26-0x0000000073360000-0x0000000073B10000-memory.dmpFilesize
7.7MB
-
memory/212-4862-0x0000000007E90000-0x0000000007EA4000-memory.dmpFilesize
80KB
-
memory/212-30-0x0000000005580000-0x0000000005590000-memory.dmpFilesize
64KB
-
memory/212-4212-0x0000000007E80000-0x0000000007E8E000-memory.dmpFilesize
56KB
-
memory/212-33-0x0000000005B20000-0x0000000005B86000-memory.dmpFilesize
408KB
-
memory/212-32-0x00000000059B0000-0x0000000005A16000-memory.dmpFilesize
408KB
-
memory/212-22-0x0000000002FF0000-0x0000000003026000-memory.dmpFilesize
216KB
-
memory/212-474-0x0000000007E20000-0x0000000007E31000-memory.dmpFilesize
68KB
-
memory/212-23-0x0000000073360000-0x0000000073B10000-memory.dmpFilesize
7.7MB
-
memory/212-457-0x0000000007EB0000-0x0000000007F46000-memory.dmpFilesize
600KB
-
memory/212-454-0x0000000008260000-0x00000000088DA000-memory.dmpFilesize
6.5MB
-
memory/212-46-0x00000000062C0000-0x0000000006614000-memory.dmpFilesize
3.3MB
-
memory/212-456-0x0000000007C90000-0x0000000007C9A000-memory.dmpFilesize
40KB
-
memory/212-455-0x0000000007C20000-0x0000000007C3A000-memory.dmpFilesize
104KB
-
memory/212-291-0x00000000078E0000-0x0000000007983000-memory.dmpFilesize
652KB
-
memory/212-228-0x0000000006EB0000-0x0000000006EE2000-memory.dmpFilesize
200KB
-
memory/212-229-0x000000006FA50000-0x000000006FA9C000-memory.dmpFilesize
304KB
-
memory/212-259-0x0000000006F10000-0x0000000006F2E000-memory.dmpFilesize
120KB
-
memory/212-227-0x0000000006920000-0x000000000696C000-memory.dmpFilesize
304KB
-
memory/212-226-0x00000000068D0000-0x00000000068EE000-memory.dmpFilesize
120KB
-
memory/3592-45-0x0000000006A70000-0x0000000007014000-memory.dmpFilesize
5.6MB
-
memory/3592-87-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-59-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-57-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-55-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-52-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-49-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-48-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-63-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-107-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-109-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-111-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-105-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-103-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-101-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-99-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-97-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-65-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-69-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-95-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-93-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-91-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-89-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-67-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-86-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-83-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-81-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-79-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-71-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-73-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-75-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-77-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-61-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-53-0x0000000006270000-0x000000000648C000-memory.dmpFilesize
2.1MB
-
memory/3592-47-0x00000000065D0000-0x0000000006662000-memory.dmpFilesize
584KB
-
memory/3592-44-0x0000000006270000-0x0000000006492000-memory.dmpFilesize
2.1MB
-
memory/3592-34-0x0000000004F20000-0x0000000005140000-memory.dmpFilesize
2.1MB
-
memory/3592-4963-0x0000000007070000-0x00000000070C4000-memory.dmpFilesize
336KB
-
memory/3592-28-0x0000000004F10000-0x0000000004F20000-memory.dmpFilesize
64KB
-
memory/3592-20-0x000000007336E000-0x000000007336F000-memory.dmpFilesize
4KB
-
memory/3592-24-0x0000000000310000-0x0000000000572000-memory.dmpFilesize
2.4MB
-
memory/3592-4958-0x00000000067F0000-0x000000000684C000-memory.dmpFilesize
368KB
-
memory/3592-4959-0x0000000006850000-0x000000000689C000-memory.dmpFilesize
304KB
-
memory/4224-4967-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4484-27-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB
-
memory/4484-29-0x0000000000400000-0x00000000004DD000-memory.dmpFilesize
884KB
-
memory/4484-4972-0x0000000000400000-0x00000000004DD000-memory.dmpFilesize
884KB