Analysis
-
max time kernel
147s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 03:12
Behavioral task
behavioral1
Sample
time.exe
Resource
win7-20240221-en
General
-
Target
time.exe
-
Size
6.6MB
-
MD5
10927dbe47f47c1f4260bf4723ed0912
-
SHA1
0ed62e76ca8d7e9e7ba514d5ed9aa24ddaf4f22d
-
SHA256
f08b325f5322a698e14f97db29d322e9ee91ad636ac688af352d51057fc56526
-
SHA512
ecb833ffbb4dd8ec25ff5e39a8ce6c4d0c36dcd02873ebc0fbfcf561ad1270db6dde600ea429800c538eaa9adae10cc1f8c45d4f469a59d1123b203e3a8867f9
-
SSDEEP
98304:CCj8xgBfao1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkS:jjhaofdQmRKuErSEEJwdFvZnCkK
Malware Config
Extracted
asyncrat
0.5.7B
Default
todfg.duckdns.org:6745
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
updateee.exe
-
install_folder
%AppData%
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5052 created 3460 5052 time.exe 56 -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/940-36-0x0000026009000000-0x0000026009012000-memory.dmp family_asyncrat -
Loads dropped DLL 4 IoCs
pid Process 5052 time.exe 5052 time.exe 5052 time.exe 5052 time.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5052 time.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 5052 time.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 5052 5068 time.exe 83 PID 5068 wrote to memory of 5052 5068 time.exe 83 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85 PID 5052 wrote to memory of 940 5052 time.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\time.exe"C:\Users\Admin\AppData\Local\Temp\time.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\time.exe"C:\Users\Admin\AppData\Local\Temp\time.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:5052
-
-
-
C:\Windows\System32\notepad.exeC:\Windows\System32\notepad.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
81KB
MD510d42efac304861ad19821b4594fa959
SHA11a65f60bba991bc7e9322af1e19f193dae76d77a
SHA2568eecdcc250637652e6babc306ea6b8820e9e835ddd2434816d0e0fd0ca67fd14
SHA5123f16dba627a133586e9d1c16d383b9461424d31892278ab984f7e6932a1cdc51445e1bec017a665bd66c0f2a9ba417387fecc5fdede36d67f8343b82a2ceb9ae
-
Filesize
120KB
MD5df6be515e183a0e4dbe9cdda17836664
SHA1a5e8796189631c1aaca6b1c40bc5a23eb20b85db
SHA256af598ae52ddc6869f24d36a483b77988385a5bbbf4618b2e2630d89d10a107ee
SHA512b3f23530de7386cc4dcf6ad39141240e56d36322e3d4041e40d69d80dd529d1f8ef5f65b55cdca9641e378603b5252acfe5d50f39f0c6032fd4c307f73ef9253
-
Filesize
245KB
MD5a1ffc2a156e9266932c351a88e5e7fab
SHA1ebfc901c28035264fbb5b0f30e68ab3b45410d13
SHA256b8409829dc4fde70f38754de55d3090a1cd52c78ffece2a08572a58de3af294d
SHA51274fecaac362deff5139ea8553142ba7e8a7740b757a06edf16cf4a9320a20e7a1567380bfe2f40a3b7e8508f9715efedf27c6c23d2b2fb3ed7664cb81f6d58d9
-
Filesize
62KB
MD5f419ac6e11b4138eea1fe8c86689076a
SHA1886cda33fa3a4c232caa0fa048a08380971e8939
SHA256441d32922122e59f75a728cc818f8e50613866a6c3dec627098e6cc6c53624e2
SHA5126b5aa5f5fbc00fb48f49b441801ee3f3214bd07382444569f089efb02a93ce907f6f4e0df281bda81c80f2d6a247b0adc7c2384a2e484bc7ef43b43c84756d2b
-
Filesize
153KB
MD53230404a7191c6228a8772d3610e49e5
SHA14e8e36c89b4ff440ddff9a5b084b262c9b2394ec
SHA25633ae42f744d2688bb7d5519f32ff7b7489b96f4eea47f66d2009dba6a0023903
SHA5126ecce0c8e8b3d42275d486e8ff495e81e36adaaacaaa3db37844e204fcdaa6d89cb3d81c43d9e16d938cd8b6671b8800fe74a1e723a9187b0566a8f3c39d5d5b
-
Filesize
76KB
MD50fc65ec300553d8070e6b44b9b23b8c0
SHA1f8db6af578cf417cfcddb2ed798c571c1abd878f
SHA256360744663fce8dec252abbda1168f470244fdb6da5740bb7ab3171e19106e63c
SHA512cba375a815db973b4e8babda951d1a4ca90a976e9806e9a62520a0729937d25de8e600e79a7a638d77df7f47001d8f884e88ee4497bd1e05c1dae6fa67fb3dd8
-
Filesize
1.4MB
MD59dc12ea9f7821873da74c772abb280f0
SHA13f271c9f54bc7740b95eaa20debbd156ebd50760
SHA256c5ec59385bfac2a0ac38abf1377360cd1fddd05c31f8a8b4e44252e0e63acb10
SHA512a3175c170bbb28c199ab74ad3116e71f03f124d448bf0e9dd4afcacdc08a7a52284cf858cfd7e72d35bd1e68c6ba0c2a1a0025199aeb671777977ea53e1f2535
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
37KB
MD5d86a9d75380fab7640bb950aeb05e50e
SHA11c61aaf9022cd1f09a959f7b2a65fb1372d187d7
SHA25668fba9dd89bfad35f8fd657b9af22a8aebda31bffda35058a7f5ae376136e89b
SHA51218437e64061221be411a1587f634b4b8efa60e661dbc35fd96a6d0e7eff812752de0ada755c01f286efefc47fb5f2daf07953b4cfc4119121b6bee7756c88d0f
-
Filesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38
-
Filesize
28KB
MD5116335ebc419dd5224dd9a4f2a765467
SHA1482ef3d79bfd6b6b737f8d546cd9f1812bd1663d
SHA256813eede996fc08e1c9a6d45aaa4cbae1e82e781d69885680a358b4d818cfc0d4
SHA51241dc7facab0757ed1e286ae8e41122e09738733ad110c2918f5e2120dfb0dbff0daefcad2bffd1715b15b44c861b1dd7fb0d514983db50ddc758f47c1b9b3bf3
-
Filesize
1.1MB
MD5cdb5f373d24adceb4dc4fa1677757f0c
SHA1af6b381eed65d244c57129346008ec8532ba336b
SHA256175c4cb528f1ac4e285c575cc3f5e85ec4b3ae88860210b5d795b580c7f0b5d9
SHA512429a326648c761bf068ca7735094644f532d631cf9355c9f1a5743a5791837a36cd6aa2efe2265c7541feb06310d0c07b634dd04438d8eddbdf1c4147938a868