Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 20:31
Behavioral task
behavioral1
Sample
System.exe
Resource
win7-20240708-en
General
-
Target
System.exe
-
Size
47KB
-
MD5
b54a96fc6a2c782fe559ab2a5a6c926f
-
SHA1
48ba8ab74fe7e669ef28304852728466b92998c3
-
SHA256
e6d47f48a0ce335565ab3f98b7fcea9b3078e0c8a100f9b85f5c1dd8e5c61647
-
SHA512
67a3c71c9ddb6eab42086f5881a2473832762f742cfe5f465a719d4cf69334629ff81797a5a438e74f12abbfd7850c15621919ac7babf3d7b3a357ca86c7531f
-
SSDEEP
768:8uMBi+TDlxOZvWUjwF8ONmo2qztSZ716XtFOtmY8/LQfPImB1sgV0b66OMUEjKK+:8uMB1TDlssF72B71SO8K4mBGVb66ujak
Malware Config
Extracted
asyncrat
0.5.8
Default
newstartagain.servequake.com:6606
newstartagain.servequake.com:7707
newstartagain.servequake.com:8808
newstartagain50.duckdns.org:6606
newstartagain50.duckdns.org:7707
newstartagain50.duckdns.org:8808
Fm255Mv55doc
-
delay
3
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023384-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3310979990-555183016-1244931625-1000\Control Panel\International\Geo\Nation System.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3964 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe 4904 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4904 System.exe Token: SeDebugPrivilege 5056 System.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4808 4904 System.exe 83 PID 4904 wrote to memory of 4808 4904 System.exe 83 PID 4904 wrote to memory of 4808 4904 System.exe 83 PID 4904 wrote to memory of 4556 4904 System.exe 85 PID 4904 wrote to memory of 4556 4904 System.exe 85 PID 4904 wrote to memory of 4556 4904 System.exe 85 PID 4556 wrote to memory of 3964 4556 cmd.exe 87 PID 4556 wrote to memory of 3964 4556 cmd.exe 87 PID 4556 wrote to memory of 3964 4556 cmd.exe 87 PID 4808 wrote to memory of 2436 4808 cmd.exe 88 PID 4808 wrote to memory of 2436 4808 cmd.exe 88 PID 4808 wrote to memory of 2436 4808 cmd.exe 88 PID 4556 wrote to memory of 5056 4556 cmd.exe 89 PID 4556 wrote to memory of 5056 4556 cmd.exe 89 PID 4556 wrote to memory of 5056 4556 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA662.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3964
-
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5acc9090417037dfa2a55b46ed86e32b8
SHA153fa6fb25fb3e88c24d2027aca6ae492b2800a4d
SHA2562412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b
SHA512d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b
-
Filesize
150B
MD5adc6824a4f979d5df668c0778086c7a1
SHA1d03d469803377a3485af632125229e6e496e6d4f
SHA256ee1b73db5e6982db98972a6f371956bac01eb3d9fbf7c6ccdcde6d8f29255759
SHA51201102ac9e6971e433d46306eb58310b1d8d198883145921fd8da0cca5fda84643d1c4c266a3d81ae0ae86b5e97b5a17e300c749b40bd66d5dcee7767eb148473
-
Filesize
47KB
MD5b54a96fc6a2c782fe559ab2a5a6c926f
SHA148ba8ab74fe7e669ef28304852728466b92998c3
SHA256e6d47f48a0ce335565ab3f98b7fcea9b3078e0c8a100f9b85f5c1dd8e5c61647
SHA51267a3c71c9ddb6eab42086f5881a2473832762f742cfe5f465a719d4cf69334629ff81797a5a438e74f12abbfd7850c15621919ac7babf3d7b3a357ca86c7531f