Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 01:43
Behavioral task
behavioral1
Sample
LisectAVT_2403002C_149.exe
Resource
win7-20240708-en
General
-
Target
LisectAVT_2403002C_149.exe
-
Size
66KB
-
MD5
433bf8f02605fcf30d63ee99f94be057
-
SHA1
740c51573e09c20ea99054cde34eff26512c37a9
-
SHA256
c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
-
SHA512
75c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d
-
SSDEEP
1536:YKh54k58k/GWZOKuvUYF9ebF0ruhDbC0mvCMJurITGy/:YK/4k58kAKuvUYF9ebSruxbCjJuOh/
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
story-pl.gl.at.ply.gg:13978
dsopfkpsdgkspohspog-0p
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000001e4ea-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation LisectAVT_2403002C_149.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002C_149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2472 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 2396 LisectAVT_2403002C_149.exe 4644 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2396 LisectAVT_2403002C_149.exe Token: SeDebugPrivilege 4644 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4644 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4752 2396 LisectAVT_2403002C_149.exe 89 PID 2396 wrote to memory of 4752 2396 LisectAVT_2403002C_149.exe 89 PID 2396 wrote to memory of 4752 2396 LisectAVT_2403002C_149.exe 89 PID 2396 wrote to memory of 4360 2396 LisectAVT_2403002C_149.exe 91 PID 2396 wrote to memory of 4360 2396 LisectAVT_2403002C_149.exe 91 PID 2396 wrote to memory of 4360 2396 LisectAVT_2403002C_149.exe 91 PID 4360 wrote to memory of 2472 4360 cmd.exe 93 PID 4360 wrote to memory of 2472 4360 cmd.exe 93 PID 4360 wrote to memory of 2472 4360 cmd.exe 93 PID 4752 wrote to memory of 4876 4752 cmd.exe 94 PID 4752 wrote to memory of 4876 4752 cmd.exe 94 PID 4752 wrote to memory of 4876 4752 cmd.exe 94 PID 4360 wrote to memory of 4644 4360 cmd.exe 95 PID 4360 wrote to memory of 4644 4360 cmd.exe 95 PID 4360 wrote to memory of 4644 4360 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_149.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002C_149.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAA98.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5433bf8f02605fcf30d63ee99f94be057
SHA1740c51573e09c20ea99054cde34eff26512c37a9
SHA256c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
SHA51275c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d
-
Filesize
154B
MD5151c6444045520eb4bcb383db49caaa1
SHA110eedd8035c7dc3b58c3e51132f5cce140e2db2a
SHA256140e99c7406147da64d6b95d6d30a4c36dcfb1745e60ab3558d2452d99cd18a5
SHA51231c32950e99265f05eba8311a92974943614ae799e8edd634c2e46b4f49203119e27b8962626bc43e8a9a3dd644754e0d337afba32351d76104d050f6d371543