Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
Resource
win11-20240709-en
General
-
Target
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe
-
Size
1.7MB
-
MD5
47d2d449ec519d7d24feafff8088735f
-
SHA1
75fd74fffc8a9da0ef33dce2a616fd2424e41b86
-
SHA256
1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033
-
SHA512
9fd8f13e6fc0ddf3cd69eb23f5fd9982b1f9f2f361b4b37de445bceea18860bdf8ca9ef546302d927b8ad749f48789ff51fe4797a69106a82921e275b5ada08b
-
SSDEEP
24576:Bn1MHQ7hZjEnBmMYYsB3J0zNMESsm/r8REOuPOEkU1johR:1NZjEnBmMAJGNusYr8REOuP3kUZohR
Malware Config
Extracted
asyncrat
0.5.7B
Aakn1515knAakn1515kn
-
c2_url_file
http://update-checker-status.cc/OCB-Async.txt
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\SystemGPU\\PCI-GPU.exe\"," 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3452 set thread context of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe Token: SeDebugPrivilege 3128 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3452 wrote to memory of 832 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 87 PID 3452 wrote to memory of 832 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 87 PID 3452 wrote to memory of 832 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 87 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88 PID 3452 wrote to memory of 3128 3452 1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe"C:\Users\Admin\AppData\Local\Temp\1063141a71a9f3b788d4be37ff25d52cb29f7ec8105fbd8b90129073e78cd033.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3128
-