Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe
Resource
win7-20240704-en
General
-
Target
15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe
-
Size
453KB
-
MD5
2bb4a448b0132c70a9f3c03db54a52f3
-
SHA1
2338d8ae200271ccfcf5bb8d97c8c98c52deb43c
-
SHA256
15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca
-
SHA512
5352592d1dfb6771db491a18dda53c481aee0a072d2c511959f3e2cf9532ac176a6a2f9520b22a4d4675098e089a819f1b4da89d0ec615c9458bcff1ea4cbe29
-
SSDEEP
12288:3GHr/rHAbXqXVpJqrNix6LDQfLlzH1yv5p:3GHrMXqXwAx0QjO
Malware Config
Extracted
asyncrat
0.5.6D
Default
seznam.zapto.org:6606
seznam.zapto.org:7707
seznam.zapto.org:8808
spqniepxaluvdm
-
delay
5
-
install
true
-
install_file
microssofte.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3040-2-0x0000000000320000-0x0000000000332000-memory.dmp family_asyncrat behavioral1/memory/2604-18-0x00000000001A0000-0x00000000001B2000-memory.dmp family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2604 microssofte.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2324 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe Token: SeDebugPrivilege 2604 microssofte.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2784 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 30 PID 3040 wrote to memory of 2784 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 30 PID 3040 wrote to memory of 2784 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 30 PID 3040 wrote to memory of 2784 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 30 PID 3040 wrote to memory of 2700 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 31 PID 3040 wrote to memory of 2700 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 31 PID 3040 wrote to memory of 2700 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 31 PID 3040 wrote to memory of 2700 3040 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe 31 PID 2700 wrote to memory of 2324 2700 cmd.exe 34 PID 2700 wrote to memory of 2324 2700 cmd.exe 34 PID 2700 wrote to memory of 2324 2700 cmd.exe 34 PID 2700 wrote to memory of 2324 2700 cmd.exe 34 PID 2784 wrote to memory of 2864 2784 cmd.exe 35 PID 2784 wrote to memory of 2864 2784 cmd.exe 35 PID 2784 wrote to memory of 2864 2784 cmd.exe 35 PID 2784 wrote to memory of 2864 2784 cmd.exe 35 PID 2700 wrote to memory of 2604 2700 cmd.exe 36 PID 2700 wrote to memory of 2604 2700 cmd.exe 36 PID 2700 wrote to memory of 2604 2700 cmd.exe 36 PID 2700 wrote to memory of 2604 2700 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe"C:\Users\Admin\AppData\Local\Temp\15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca /tr '"C:\Users\Admin\AppData\Roaming\microssofte.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn 15c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca /tr '"C:\Users\Admin\AppData\Roaming\microssofte.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3F61.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\microssofte.exe"C:\Users\Admin\AppData\Roaming\microssofte.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
155B
MD50befa8352a43142456fd91bdd226a2dd
SHA1b36b08f8211078859a1e5f8218eacc44bdb0eada
SHA2561fa9cb1c8c14ba9aa4f22fb2583de542de9413a6985377fc67065469bc772474
SHA512e1c8039157cc408e13ad4c1124316657c395d66696c72fdeeac32426a1543ffeaf02703309bd4b070ec6ef5be6ca5a516ad05e1446ee3d9af2abbfc28423726c
-
Filesize
453KB
MD52bb4a448b0132c70a9f3c03db54a52f3
SHA12338d8ae200271ccfcf5bb8d97c8c98c52deb43c
SHA25615c5c9dc7be64d7d32bf2925ce8412b3f2f212ba7c25af969d9a8ece2086a5ca
SHA5125352592d1dfb6771db491a18dda53c481aee0a072d2c511959f3e2cf9532ac176a6a2f9520b22a4d4675098e089a819f1b4da89d0ec615c9458bcff1ea4cbe29