Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 05:56
Behavioral task
behavioral1
Sample
c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe
Resource
win7-20240708-en
General
-
Target
c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe
-
Size
66KB
-
MD5
433bf8f02605fcf30d63ee99f94be057
-
SHA1
740c51573e09c20ea99054cde34eff26512c37a9
-
SHA256
c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
-
SHA512
75c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d
-
SSDEEP
1536:YKh54k58k/GWZOKuvUYF9ebF0ruhDbC0mvCMJurITGy/:YK/4k58kAKuvUYF9ebSruxbCjJuOh/
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
story-pl.gl.at.ply.gg:13978
dsopfkpsdgkspohspog-0p
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a00000001e63c-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe -
Executes dropped EXE 1 IoCs
pid Process 4692 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3648 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 4692 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe Token: SeDebugPrivilege 4692 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4692 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3772 wrote to memory of 2928 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 91 PID 3772 wrote to memory of 2928 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 91 PID 3772 wrote to memory of 2928 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 91 PID 3772 wrote to memory of 1708 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 93 PID 3772 wrote to memory of 1708 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 93 PID 3772 wrote to memory of 1708 3772 c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe 93 PID 1708 wrote to memory of 3648 1708 cmd.exe 95 PID 1708 wrote to memory of 3648 1708 cmd.exe 95 PID 1708 wrote to memory of 3648 1708 cmd.exe 95 PID 2928 wrote to memory of 532 2928 cmd.exe 96 PID 2928 wrote to memory of 532 2928 cmd.exe 96 PID 2928 wrote to memory of 532 2928 cmd.exe 96 PID 1708 wrote to memory of 4692 1708 cmd.exe 98 PID 1708 wrote to memory of 4692 1708 cmd.exe 98 PID 1708 wrote to memory of 4692 1708 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe"C:\Users\Admin\AppData\Local\Temp\c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpACAB.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5433bf8f02605fcf30d63ee99f94be057
SHA1740c51573e09c20ea99054cde34eff26512c37a9
SHA256c72c02aa10e6609c29969f89b655aa99c7416aa87b391cf877fb1d31982bab66
SHA51275c5ba92e8a550838f2810f016ab22fb60e4e6005f141ade5d968e888e8c05ad9828b1c723cacb346991dddb20c5c49d7cf4b2e3451707f6b9293e1b58992d2d
-
Filesize
154B
MD502eda5c36aa53054bc55004c168bda31
SHA1c5335050bca6204ef77681457f00dad74edd98e1
SHA256deee5ef7b14463f44d51093e990eb4b53913f5c228db98f946530138a64ec1ad
SHA5124cbc0b5a80173778af63de8258a1797293f75d70f9800e8843a08c0436d5eeab6e73216afe680fae72980db0fa306024041e35ee8ecbddbd8039668b8a2a3dba