Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 23:31
Behavioral task
behavioral1
Sample
Install.cmd
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Install.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Loader.exe
Resource
win7-20240704-en
General
-
Target
Loader.exe
-
Size
63KB
-
MD5
004ba87604ac07c77d161b96bfd97a34
-
SHA1
8f089b87f831946c617af9702ba79d20ddaf7394
-
SHA256
bfbef5852faa1e2de88f380c620af93eb08114363c1d72d74d5809e7ff70f881
-
SHA512
322a6fc44d0390ad55a7bf0cfe268814e00df2e757a8088d11d7addd9d2b089e4c62d4c955f2272b7ec50033e68a59f72778912cbae125e01c5b74c1b2909b8a
-
SSDEEP
768:Cuw6LVcsTPq781wC8A+Xjapeyr61urX1+T4uoSBGHmDbDTph0oXzkKhbSuEdpqKX:LeQPcUn0tYUbJh9zkw+uEdpqKmY7
Malware Config
Extracted
asyncrat
Default
anyone-blogging.gl.at.ply.gg:22284
-
delay
1
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x000b0000000233d4-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation Loader.exe -
Executes dropped EXE 1 IoCs
pid Process 3632 Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2640 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe 5096 Loader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5096 Loader.exe Token: SeDebugPrivilege 5096 Loader.exe Token: SeDebugPrivilege 3632 Windows.exe Token: SeDebugPrivilege 3632 Windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3956 5096 Loader.exe 86 PID 5096 wrote to memory of 3956 5096 Loader.exe 86 PID 5096 wrote to memory of 4664 5096 Loader.exe 88 PID 5096 wrote to memory of 4664 5096 Loader.exe 88 PID 4664 wrote to memory of 2640 4664 cmd.exe 90 PID 4664 wrote to memory of 2640 4664 cmd.exe 90 PID 3956 wrote to memory of 3100 3956 cmd.exe 91 PID 3956 wrote to memory of 3100 3956 cmd.exe 91 PID 4664 wrote to memory of 3632 4664 cmd.exe 92 PID 4664 wrote to memory of 3632 4664 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp66F7.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2640
-
-
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5233e99503329abaf1e399f1c4b89e9ae
SHA1fa4ed380b40c70dbf30780dec7822c1722eb8441
SHA256e59dbce5c68ad15a6670f489649e9512caa1749f8b8b6822810cf200dec3acde
SHA512489b78ea3400b8067eadf3266052a83f49f5d2de3113076a680cc7b410e7758c93d6770c9a2f8d7ba6f490e8449594ced4e2c67f416a761dbeee7396a28257c9
-
Filesize
63KB
MD5004ba87604ac07c77d161b96bfd97a34
SHA18f089b87f831946c617af9702ba79d20ddaf7394
SHA256bfbef5852faa1e2de88f380c620af93eb08114363c1d72d74d5809e7ff70f881
SHA512322a6fc44d0390ad55a7bf0cfe268814e00df2e757a8088d11d7addd9d2b089e4c62d4c955f2272b7ec50033e68a59f72778912cbae125e01c5b74c1b2909b8a