Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 23:31
Behavioral task
behavioral1
Sample
Install.cmd
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Install.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win7-20240704-en
General
-
Target
Loader.exe
-
Size
63KB
-
MD5
004ba87604ac07c77d161b96bfd97a34
-
SHA1
8f089b87f831946c617af9702ba79d20ddaf7394
-
SHA256
bfbef5852faa1e2de88f380c620af93eb08114363c1d72d74d5809e7ff70f881
-
SHA512
322a6fc44d0390ad55a7bf0cfe268814e00df2e757a8088d11d7addd9d2b089e4c62d4c955f2272b7ec50033e68a59f72778912cbae125e01c5b74c1b2909b8a
-
SSDEEP
768:Cuw6LVcsTPq781wC8A+Xjapeyr61urX1+T4uoSBGHmDbDTph0oXzkKhbSuEdpqKX:LeQPcUn0tYUbJh9zkw+uEdpqKmY7
Malware Config
Extracted
asyncrat
Default
anyone-blogging.gl.at.ply.gg:22284
-
delay
1
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral3/files/0x003100000001867d-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2012 Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2356 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2624 Loader.exe 2624 Loader.exe 2624 Loader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2624 Loader.exe Token: SeDebugPrivilege 2624 Loader.exe Token: SeDebugPrivilege 2012 Windows.exe Token: SeDebugPrivilege 2012 Windows.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2648 2624 Loader.exe 30 PID 2624 wrote to memory of 2648 2624 Loader.exe 30 PID 2624 wrote to memory of 2648 2624 Loader.exe 30 PID 2624 wrote to memory of 2828 2624 Loader.exe 32 PID 2624 wrote to memory of 2828 2624 Loader.exe 32 PID 2624 wrote to memory of 2828 2624 Loader.exe 32 PID 2648 wrote to memory of 3044 2648 cmd.exe 34 PID 2648 wrote to memory of 3044 2648 cmd.exe 34 PID 2648 wrote to memory of 3044 2648 cmd.exe 34 PID 2828 wrote to memory of 2356 2828 cmd.exe 35 PID 2828 wrote to memory of 2356 2828 cmd.exe 35 PID 2828 wrote to memory of 2356 2828 cmd.exe 35 PID 2828 wrote to memory of 2012 2828 cmd.exe 36 PID 2828 wrote to memory of 2012 2828 cmd.exe 36 PID 2828 wrote to memory of 2012 2828 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3044
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1FE0.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2356
-
-
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD529a311ab154571d32f2e5d87dc89cc1e
SHA1df60be28b09e9adb47678756d26d2e2ff9f89299
SHA2567a8deab333d85bc64e2a66c153ec08bfbc97601240f828a73ce5fda3caa355ee
SHA5123f602e5de98446416ac2bac44806bb74cb88e64ee52167931907196933808c588bfd190c5fcbcb61f3c220c691ffd26f13f688711c6513cfab13e39998db70c4
-
Filesize
63KB
MD5004ba87604ac07c77d161b96bfd97a34
SHA18f089b87f831946c617af9702ba79d20ddaf7394
SHA256bfbef5852faa1e2de88f380c620af93eb08114363c1d72d74d5809e7ff70f881
SHA512322a6fc44d0390ad55a7bf0cfe268814e00df2e757a8088d11d7addd9d2b089e4c62d4c955f2272b7ec50033e68a59f72778912cbae125e01c5b74c1b2909b8a