Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 22:34
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240704-en
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
4fa92eda691f571d5c8ca313ea5ced3e
-
SHA1
5e75ba444f13c933e19a764581d92f26496edb08
-
SHA256
792ac08ad6bdd2f31444390d4f06be0f261ef493a3e83847e016b1292173878a
-
SHA512
279b86f470b26f40830939d110af9826884b92e5ae68b3a36db82265e8d73d59b35b55c249aeddc0afd72af8afcf7cfd29634daeb4a22cf486f23ba40d14ef58
-
SSDEEP
768:bukaVT3ongoWU2Gjimo2qrgKjPGaG6PIyzjbFgX3i5BOY4eEA28mIBDZZ4:bukaVT3Q+25KTkDy3bCXS6H8rdZ4
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
purIcKAdLoRB
-
delay
3
-
install
true
-
install_file
SVHOST.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012119-14.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2132 SVHOST.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2356 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 AsyncClient.exe 2248 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2248 AsyncClient.exe Token: SeDebugPrivilege 2132 SVHOST.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2524 2248 AsyncClient.exe 28 PID 2248 wrote to memory of 2524 2248 AsyncClient.exe 28 PID 2248 wrote to memory of 2524 2248 AsyncClient.exe 28 PID 2248 wrote to memory of 2524 2248 AsyncClient.exe 28 PID 2248 wrote to memory of 2888 2248 AsyncClient.exe 30 PID 2248 wrote to memory of 2888 2248 AsyncClient.exe 30 PID 2248 wrote to memory of 2888 2248 AsyncClient.exe 30 PID 2248 wrote to memory of 2888 2248 AsyncClient.exe 30 PID 2888 wrote to memory of 2356 2888 cmd.exe 32 PID 2888 wrote to memory of 2356 2888 cmd.exe 32 PID 2888 wrote to memory of 2356 2888 cmd.exe 32 PID 2888 wrote to memory of 2356 2888 cmd.exe 32 PID 2524 wrote to memory of 2992 2524 cmd.exe 33 PID 2524 wrote to memory of 2992 2524 cmd.exe 33 PID 2524 wrote to memory of 2992 2524 cmd.exe 33 PID 2524 wrote to memory of 2992 2524 cmd.exe 33 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36 PID 2888 wrote to memory of 2132 2888 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SVHOST" /tr '"C:\Users\Admin\AppData\Local\Temp\SVHOST.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SVHOST" /tr '"C:\Users\Admin\AppData\Local\Temp\SVHOST.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC8AC.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\SVHOST.exe"C:\Users\Admin\AppData\Local\Temp\SVHOST.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD54fa92eda691f571d5c8ca313ea5ced3e
SHA15e75ba444f13c933e19a764581d92f26496edb08
SHA256792ac08ad6bdd2f31444390d4f06be0f261ef493a3e83847e016b1292173878a
SHA512279b86f470b26f40830939d110af9826884b92e5ae68b3a36db82265e8d73d59b35b55c249aeddc0afd72af8afcf7cfd29634daeb4a22cf486f23ba40d14ef58
-
Filesize
153B
MD5e85557b038914d00e43a1332cbb37d14
SHA196f38e2a24cd23a8b54e898f4a28ade98b339ba6
SHA25650631e6d7a79718247ec845c4759a261e86a8cdf054f029130d6272b75e1b750
SHA512ef58e8d00071bd470c82d565e4deab8112abf9c71b468a59e5486dbc496b709636f3c30471a04f02fb01ddd97ef4292e3e67a708866234d4c11cc481e72b02e9