Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 01:43
Behavioral task
behavioral1
Sample
LisectAVT_2403002C_149.exe
Resource
win7-20240708-en
General
-
Target
LisectAVT_2403002C_149.exe
-
Size
66KB
-
MD5
433bf8f02605fcf30d63ee99f94be057
-
SHA1
740c51573e09c20ea99054cde34eff26512c37a9
-
SHA256
c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
-
SHA512
75c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d
-
SSDEEP
1536:YKh54k58k/GWZOKuvUYF9ebF0ruhDbC0mvCMJurITGy/:YK/4k58kAKuvUYF9ebSruxbCjJuOh/
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
story-pl.gl.at.ply.gg:13978
dsopfkpsdgkspohspog-0p
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000017093-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2824 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2844 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002C_149.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2836 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2420 LisectAVT_2403002C_149.exe 2420 LisectAVT_2403002C_149.exe 2420 LisectAVT_2403002C_149.exe 2824 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2420 LisectAVT_2403002C_149.exe Token: SeDebugPrivilege 2824 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2824 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2420 wrote to memory of 636 2420 LisectAVT_2403002C_149.exe 32 PID 2420 wrote to memory of 636 2420 LisectAVT_2403002C_149.exe 32 PID 2420 wrote to memory of 636 2420 LisectAVT_2403002C_149.exe 32 PID 2420 wrote to memory of 636 2420 LisectAVT_2403002C_149.exe 32 PID 2420 wrote to memory of 2844 2420 LisectAVT_2403002C_149.exe 34 PID 2420 wrote to memory of 2844 2420 LisectAVT_2403002C_149.exe 34 PID 2420 wrote to memory of 2844 2420 LisectAVT_2403002C_149.exe 34 PID 2420 wrote to memory of 2844 2420 LisectAVT_2403002C_149.exe 34 PID 2844 wrote to memory of 2836 2844 cmd.exe 36 PID 2844 wrote to memory of 2836 2844 cmd.exe 36 PID 2844 wrote to memory of 2836 2844 cmd.exe 36 PID 2844 wrote to memory of 2836 2844 cmd.exe 36 PID 636 wrote to memory of 2764 636 cmd.exe 37 PID 636 wrote to memory of 2764 636 cmd.exe 37 PID 636 wrote to memory of 2764 636 cmd.exe 37 PID 636 wrote to memory of 2764 636 cmd.exe 37 PID 2844 wrote to memory of 2824 2844 cmd.exe 38 PID 2844 wrote to memory of 2824 2844 cmd.exe 38 PID 2844 wrote to memory of 2824 2844 cmd.exe 38 PID 2844 wrote to memory of 2824 2844 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_149.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_149.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDC89.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD54a2a9cd80c3b6bb1fd69458a0d1335ab
SHA1be2221d2075d732c77b4e23cef12f1d5fab08030
SHA256a0916e75e5dab90d253b8e4d52bfe085e01dbe8ea1446dff64c0d6820011ce0e
SHA5122bfc982cde0965beced90bdba1f3c36ded92a3d4579b1707d2e5b3acd153a0beda1ef7f77b2cdcb511b91742c3e4e8cef4f63bb99ef8136207a5a747a48af3f6
-
Filesize
66KB
MD5433bf8f02605fcf30d63ee99f94be057
SHA1740c51573e09c20ea99054cde34eff26512c37a9
SHA256c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
SHA51275c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d