Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/06/2024, 16:46
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240508-en
General
-
Target
Client.exe
-
Size
74KB
-
MD5
a43b6b601b7847ce56c9c06fb89d027c
-
SHA1
47e950515cacdfc73b3ee4a16645f40625c916e1
-
SHA256
4d1fa4a04980a77e88dc4e9e3bcbf91f5dfe64d57fb52276f01cfac19704b459
-
SHA512
213208c1f0e7caccb1ed9a3d59d9565549ea5f90baad127bdb8c223fb03c7b148737aac9a595f5c22fbe3de199f6ff31919f7fb6ec6aeb0f93d41ea1516e39b5
-
SSDEEP
1536:cUKkcx9pXCTyPMVWe9VdQuDI6H1bf/CQ3QzcjMVclN:cUDcx958yPMVWe9VdQsH1bf6Q3QuOY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
147.185.221.20:49485
gwbhzwlfrv
-
delay
1
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000002aa2d-12.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1144 Discord.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4464 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 2956 Client.exe 1144 Discord.exe 1144 Discord.exe 1144 Discord.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2956 Client.exe Token: SeDebugPrivilege 1144 Discord.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1144 Discord.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4884 2956 Client.exe 77 PID 2956 wrote to memory of 4884 2956 Client.exe 77 PID 2956 wrote to memory of 2952 2956 Client.exe 79 PID 2956 wrote to memory of 2952 2956 Client.exe 79 PID 4884 wrote to memory of 4460 4884 cmd.exe 81 PID 4884 wrote to memory of 4460 4884 cmd.exe 81 PID 2952 wrote to memory of 4464 2952 cmd.exe 82 PID 2952 wrote to memory of 4464 2952 cmd.exe 82 PID 2952 wrote to memory of 1144 2952 cmd.exe 83 PID 2952 wrote to memory of 1144 2952 cmd.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3A2A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4464
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD512c0a0c6a1248ef39e03979d94f21f17
SHA13a31371c66e32ed8feb0e13002f6868d49c8b29e
SHA256bdb2fae0e8eae497edafcc38f802a1b8837013a751e3dcb55070f06475871d6c
SHA512d308353f621bf0893d41f48e20cd55d3b9f5aa54eced14a1ef25e7155c165b45dfd6326d7235a6a090c5782cd29568ff6e31c437a8d885b508fd5a0649a7e98c
-
Filesize
74KB
MD5a43b6b601b7847ce56c9c06fb89d027c
SHA147e950515cacdfc73b3ee4a16645f40625c916e1
SHA2564d1fa4a04980a77e88dc4e9e3bcbf91f5dfe64d57fb52276f01cfac19704b459
SHA512213208c1f0e7caccb1ed9a3d59d9565549ea5f90baad127bdb8c223fb03c7b148737aac9a595f5c22fbe3de199f6ff31919f7fb6ec6aeb0f93d41ea1516e39b5
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b