Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
2BB4A448B0132C70A9F3C03DB54A52F3.exe
Resource
win7-20240704-en
General
-
Target
2BB4A448B0132C70A9F3C03DB54A52F3.exe
-
Size
453KB
-
MD5
2bb4a448b0132c70a9f3c03db54a52f3
-
SHA1
2338d8ae200271ccfcf5bb8d97c8c98c52deb43c
-
SHA256
15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca
-
SHA512
5352592d1dfb6771db491a18dda53c481aee0a072d2c511959f3e2cf9532ac176a6a2f9520b22a4d4675098e089a819f1b4da89d0ec615c9458bcff1ea4cbe29
-
SSDEEP
12288:3GHr/rHAbXqXVpJqrNix6LDQfLlzH1yv5p:3GHrMXqXwAx0QjO
Malware Config
Extracted
asyncrat
0.5.6D
Default
seznam.zapto.org:6606
seznam.zapto.org:7707
seznam.zapto.org:8808
spqniepxaluvdm
-
delay
5
-
install
true
-
install_file
microssofte.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3708-4-0x00000000051E0000-0x00000000051F2000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 2BB4A448B0132C70A9F3C03DB54A52F3.exe -
Executes dropped EXE 1 IoCs
pid Process 432 microssofte.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1508 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe Token: SeDebugPrivilege 432 microssofte.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3708 wrote to memory of 5008 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 86 PID 3708 wrote to memory of 5008 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 86 PID 3708 wrote to memory of 5008 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 86 PID 3708 wrote to memory of 1372 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 88 PID 3708 wrote to memory of 1372 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 88 PID 3708 wrote to memory of 1372 3708 2BB4A448B0132C70A9F3C03DB54A52F3.exe 88 PID 5008 wrote to memory of 3184 5008 cmd.exe 90 PID 5008 wrote to memory of 3184 5008 cmd.exe 90 PID 5008 wrote to memory of 3184 5008 cmd.exe 90 PID 1372 wrote to memory of 1508 1372 cmd.exe 91 PID 1372 wrote to memory of 1508 1372 cmd.exe 91 PID 1372 wrote to memory of 1508 1372 cmd.exe 91 PID 1372 wrote to memory of 432 1372 cmd.exe 92 PID 1372 wrote to memory of 432 1372 cmd.exe 92 PID 1372 wrote to memory of 432 1372 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2BB4A448B0132C70A9F3C03DB54A52F3.exe"C:\Users\Admin\AppData\Local\Temp\2BB4A448B0132C70A9F3C03DB54A52F3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn 2BB4A448B0132C70A9F3C03DB54A52F3 /tr '"C:\Users\Admin\AppData\Roaming\microssofte.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn 2BB4A448B0132C70A9F3C03DB54A52F3 /tr '"C:\Users\Admin\AppData\Roaming\microssofte.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB40E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\microssofte.exe"C:\Users\Admin\AppData\Roaming\microssofte.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD59293615ef62cba1398e4e78019bc48b8
SHA188a388465e72efe8c6921b55ac0a1f399c7917e8
SHA256d92b365e505b3d92d4a7286f5a15b848b184d1c1c671227cfece0d9b00661590
SHA51297e3268f7ce0f9f3a49b7ac48dda6974b10310d599fa237f9cae97874b6a96d1542be14670ef8c06d10162589d2a5d9f2fd8bb26a4d9b300031961a311e83899
-
Filesize
453KB
MD52bb4a448b0132c70a9f3c03db54a52f3
SHA12338d8ae200271ccfcf5bb8d97c8c98c52deb43c
SHA25615c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca
SHA5125352592d1dfb6771db491a18dda53c481aee0a072d2c511959f3e2cf9532ac176a6a2f9520b22a4d4675098e089a819f1b4da89d0ec615c9458bcff1ea4cbe29