Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe
Resource
win10v2004-20240611-en
General
-
Target
de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe
-
Size
866KB
-
MD5
17d02350b80c3c03c0be2b1acab650d1
-
SHA1
775181f6686d21806ba7e6fe4ae1ecdc82d0157f
-
SHA256
de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4
-
SHA512
e61b19867eb0aff9d43ab7f13ac73217d0bd244e8b908eb902940315d77c3df67fbde40f7d80d602d8f491065fdb98791deb5f3fd4c122ef010f09616d1aaade
-
SSDEEP
3072:dBUyU7/NUauKvxUjUYqDbf5PBb6Tx3zU5IYUeyUwgUn1UdjgUtGU4rZ/ME+h0UIx:CQdx8nHZtwjWK3FFQgzv1x5
Malware Config
Extracted
asyncrat
0.5.7B
Default
hgjvhnfgg.duckdns.org:8057
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe\"" de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
resource yara_rule behavioral1/memory/2344-3-0x00000000002F0000-0x0000000000318000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
resource yara_rule behavioral1/memory/2344-3-0x00000000002F0000-0x0000000000318000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule behavioral1/memory/2344-3-0x00000000002F0000-0x0000000000318000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables potentially checking for WinJail sandbox window 2 IoCs
resource yara_rule behavioral1/memory/2344-3-0x00000000002F0000-0x0000000000318000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_WinJail behavioral1/memory/2344-3-0x00000000002F0000-0x0000000000318000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste -
Detects file containing reversed ASEP Autorun registry keys 5 IoCs
resource yara_rule behavioral1/memory/2768-11-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2768-8-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2768-7-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2768-13-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2768-15-0x0000000000400000-0x0000000000412000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe" de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe" de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1072 2344 WerFault.exe 27 -
Delays execution with timeout.exe 1 IoCs
pid Process 2680 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2272 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 28 PID 2344 wrote to memory of 2272 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 28 PID 2344 wrote to memory of 2272 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 28 PID 2344 wrote to memory of 2272 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 28 PID 2272 wrote to memory of 2680 2272 cmd.exe 30 PID 2272 wrote to memory of 2680 2272 cmd.exe 30 PID 2272 wrote to memory of 2680 2272 cmd.exe 30 PID 2272 wrote to memory of 2680 2272 cmd.exe 30 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 2768 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 31 PID 2344 wrote to memory of 1072 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 32 PID 2344 wrote to memory of 1072 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 32 PID 2344 wrote to memory of 1072 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 32 PID 2344 wrote to memory of 1072 2344 de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe"C:\Users\Admin\AppData\Local\Temp\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe"C:\Users\Admin\AppData\Local\Temp\de8636c5d87d276a4971eab3cbe5d3d3bb18618e8a24ae27b154e1548bd438a4.exe"2⤵PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 7842⤵
- Program crash
PID:1072
-