Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
5c4e8e94fdb71b3ff3a21f09ac5139a3.exe
Resource
win7-20240704-en
General
-
Target
5c4e8e94fdb71b3ff3a21f09ac5139a3.exe
-
Size
1.2MB
-
MD5
5c4e8e94fdb71b3ff3a21f09ac5139a3
-
SHA1
423a608f65cddad090bf6d157ab8b24ac033f105
-
SHA256
ee3a8b076aed6d3f4dd52056b6fbcf62455a9258600b8e520551df9305dfb9fa
-
SHA512
23962f4feb869e2fcfaad80386def9b13ed431cc4184e56a9a131169ae589a8bb399dd949640d098d942b6d38bf9b9b9f4cbd91f887b6e1a445d80874e946e33
-
SSDEEP
24576:QUNxvqF6FGYJf6yjNQpNONZNlTX5PlGPgquLEIWxUc7N11QaSYx7GqFT:QUNxvC6FGYJf6yjNQpNONZnTX5PlGPgY
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
anahowaanaa.ddnsfree.com:1111
AsyncMutex_6SI8OkSS5
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoHotkeyU64.exe AutoHotkeyU64.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoHotkeyU64.exe AutoHotkeyU64.exe -
Executes dropped EXE 1 IoCs
pid Process 3408 AutoHotkeyU64.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3408 set thread context of 724 3408 AutoHotkeyU64.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 724 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 724 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 724 AppLaunch.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3408 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe 87 PID 2424 wrote to memory of 3408 2424 5c4e8e94fdb71b3ff3a21f09ac5139a3.exe 87 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88 PID 3408 wrote to memory of 724 3408 AutoHotkeyU64.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4e8e94fdb71b3ff3a21f09ac5139a3.exe"C:\Users\Admin\AppData\Local\Temp\5c4e8e94fdb71b3ff3a21f09ac5139a3.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\Documents\AutoHotkeyU64.exeC:\Users\Admin\Documents\AutoHotkeyU64.exe2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD550b2fd640a95e3caf440bc3d8249c846
SHA146c7bd930438868a415b836b6aff4ca27cdf66f7
SHA256d01e36c121b947001a82255fa8c767084daa0cee5f10f7816036aa87e2f4da9e
SHA512a38b6b5bd38199bb08359750edc98c7d78f02f235ca530837ee2e5b6b6349bd96b132512e6db7f85da895f9ee4db3a791a97c59e4f543e9558dda02fa8797fa6
-
Filesize
1.3MB
MD52d0600fe2b1b3bdc45d833ca32a37fdb
SHA1e9a7411bfef54050de3b485833556f84cabd6e41
SHA256effdea83c6b7a1dc2ce9e9d40e91dfd59bed9fcbd580903423648b7ca97d9696
SHA5129891cd6d2140c3a5c20d5c2d6600f3655df437b99b09ae0f9daf1983190dc73385cc87f02508997bb696ac921eee43fccdf1dc210cc602938807bdb062ce1703
-
Filesize
206KB
MD55faebcef5aa3a89fd67a311f470bd7ae
SHA16b406724e0addfd21d39c5b7b004bc5548c1f4d0
SHA2563f63892d771615d05ab2b884369f8dea2e0a36a2704ab2009762ed1f33892aff
SHA512d54dfb9a54e5ac92468397a94e393022802be65312d317d660fcb70c00ea91b23fc1167a9bca0b5c83dcb3a18fc9b1677bf82bb00de888a8631fec103b19e337
-
Filesize
659KB
MD5ecfff2ef9131457dced515713825041d
SHA13709b6fddcdd2c30ad2b79d617264f8f94c52b96
SHA256c2205bea1e3cc1adba1b40c00f810b6927bbe3d2c373973f8a62c39acb4320c7
SHA512c24cf73b42663bb6aacc5b1d3f8b5853be659eed264fc6b1e05d9d999995a0c70b100b4c4b147b56f17195ac5d9cd219b2119234d33887d9e98807824d417e6d