Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
935fa2bdf4a8b2b9d71c1e87dfda27ef.exe
Resource
win7-20240508-en
General
-
Target
935fa2bdf4a8b2b9d71c1e87dfda27ef.exe
-
Size
1.1MB
-
MD5
935fa2bdf4a8b2b9d71c1e87dfda27ef
-
SHA1
468fea59efdd1e52aebd17edd6185d472a311f7e
-
SHA256
f7d1b2ecb7f47ed1311ed562bd1565f2e849d26e0c076e6ec6125d535bf17c11
-
SHA512
74434c0a88589083d9087158ec3fb75921e4715bb61654ef4688fe936d3677a3224451be9140087596c01d1ccc6054064791ad2307a84e7b9bf221b36e0def36
-
SSDEEP
24576:xcvYPuAT6+Feyf8h8zwGhKL8bzh2God0Tae3sHPFMses6n:xZP1VFeyftzdhKLsQdle3svFM
Malware Config
Extracted
asyncrat
Default
127.0.0.1:7771
127.0.0.1:39377
doffuovouvvufoz97964d-39377.portmap.host:7771
doffuovouvvufoz97964d-39377.portmap.host:39377
-
delay
1
-
install
true
-
install_file
lulz.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Infected.exe family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
935fa2bdf4a8b2b9d71c1e87dfda27ef.exeInfected.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 935fa2bdf4a8b2b9d71c1e87dfda27ef.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Infected.exe -
Executes dropped EXE 2 IoCs
Processes:
Infected.exelulz.exepid process 5112 Infected.exe 3384 lulz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3952 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
Infected.exepid process 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe 5112 Infected.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
935fa2bdf4a8b2b9d71c1e87dfda27ef.exeInfected.exelulz.exedescription pid process Token: SeDebugPrivilege 1416 935fa2bdf4a8b2b9d71c1e87dfda27ef.exe Token: SeDebugPrivilege 5112 Infected.exe Token: SeDebugPrivilege 5112 Infected.exe Token: SeDebugPrivilege 3384 lulz.exe Token: SeDebugPrivilege 3384 lulz.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
935fa2bdf4a8b2b9d71c1e87dfda27ef.exeInfected.execmd.execmd.exedescription pid process target process PID 1416 wrote to memory of 5112 1416 935fa2bdf4a8b2b9d71c1e87dfda27ef.exe Infected.exe PID 1416 wrote to memory of 5112 1416 935fa2bdf4a8b2b9d71c1e87dfda27ef.exe Infected.exe PID 5112 wrote to memory of 3296 5112 Infected.exe cmd.exe PID 5112 wrote to memory of 3296 5112 Infected.exe cmd.exe PID 5112 wrote to memory of 4900 5112 Infected.exe cmd.exe PID 5112 wrote to memory of 4900 5112 Infected.exe cmd.exe PID 3296 wrote to memory of 3328 3296 cmd.exe schtasks.exe PID 3296 wrote to memory of 3328 3296 cmd.exe schtasks.exe PID 4900 wrote to memory of 3952 4900 cmd.exe timeout.exe PID 4900 wrote to memory of 3952 4900 cmd.exe timeout.exe PID 4900 wrote to memory of 3384 4900 cmd.exe lulz.exe PID 4900 wrote to memory of 3384 4900 cmd.exe lulz.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\935fa2bdf4a8b2b9d71c1e87dfda27ef.exe"C:\Users\Admin\AppData\Local\Temp\935fa2bdf4a8b2b9d71c1e87dfda27ef.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "lulz" /tr '"C:\Users\Admin\AppData\Roaming\lulz.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "lulz" /tr '"C:\Users\Admin\AppData\Roaming\lulz.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5AA3.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\lulz.exe"C:\Users\Admin\AppData\Roaming\lulz.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Infected.exeFilesize
64KB
MD5b79066a5172f1508c1b9a8d02e9edd29
SHA108a74b0096e1df0043246e65bfe5861af4611515
SHA25666eb0f1ec9845025074d4e91f6a9f5a1a91fca45f9a59bbdb5d718ba84948674
SHA512033496e0033a0c359efbf2dbf61fa9c41804c26d3271b34b1b320598d9f3e9ea0b3276715eb99f77e50c62f3561f7fb4ad195f5b37c05430b66d0b6cb0489375
-
C:\Users\Admin\AppData\Local\Temp\tmp5AA3.tmp.batFilesize
148B
MD53547ed306326dffc30b03d53b99f3966
SHA18de52fe225a836c5dcd19292d01dd693b79390dc
SHA2563a318284b7978b3af09f140e6ad7a819f76b6a9eea0fceef2525463dc8d799c9
SHA512d99a291cd4708bc4e7f6200aeff0a141935819628f38249adfa5213ef0ae562f297a702c0ebf7377fb0cc69e52ee1136cb10bec72c08e1470e7bf82aca8dfe9b
-
memory/1416-7-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/1416-3-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/1416-4-0x000001A9AABF0000-0x000001A9AACBC000-memory.dmpFilesize
816KB
-
memory/1416-6-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/1416-0-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmpFilesize
8KB
-
memory/1416-2-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/1416-1-0x000001A98D740000-0x000001A98D860000-memory.dmpFilesize
1.1MB
-
memory/1416-30-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmpFilesize
8KB
-
memory/1416-31-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/5112-18-0x0000000000060000-0x0000000000076000-memory.dmpFilesize
88KB
-
memory/5112-19-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/5112-20-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB
-
memory/5112-25-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmpFilesize
10.8MB