Analysis
-
max time kernel
32s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 16:06
Behavioral task
behavioral1
Sample
a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe
Resource
win7-20240704-en
General
-
Target
a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe
-
Size
45KB
-
MD5
66e220b33b24bec99a124bf81f5cbee1
-
SHA1
147c16eb7bdf357f5061d2acb28736c5d49a0bdb
-
SHA256
a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99bbb25ba816717b50fa3c
-
SHA512
30d753a3fe53a4db078d6479ad16f72de80a17835c30f6269edb184f40542826e4da302be370754adeb51c47e242e1f02583a327f7b7493c6c2aa8e7069eb1c3
-
SSDEEP
768:5uiGNTdFHLBWUZiGrmo2qrrKjGKG6PIyzjbFgX3iFV7wtzuQ66cB2bkBDZyu:5uiGNTdBR2mKYDy3bCXSX7wtzuQMySd7
Malware Config
Extracted
asyncrat
0.5.7B
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/bHKKgu6n
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000900000001227c-13.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2740 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2860 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe Token: SeDebugPrivilege 2740 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2564 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 29 PID 2364 wrote to memory of 2564 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 29 PID 2364 wrote to memory of 2564 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 29 PID 2364 wrote to memory of 2564 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 29 PID 2364 wrote to memory of 2468 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 31 PID 2364 wrote to memory of 2468 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 31 PID 2364 wrote to memory of 2468 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 31 PID 2364 wrote to memory of 2468 2364 a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe 31 PID 2564 wrote to memory of 2304 2564 cmd.exe 33 PID 2564 wrote to memory of 2304 2564 cmd.exe 33 PID 2564 wrote to memory of 2304 2564 cmd.exe 33 PID 2564 wrote to memory of 2304 2564 cmd.exe 33 PID 2468 wrote to memory of 2860 2468 cmd.exe 34 PID 2468 wrote to memory of 2860 2468 cmd.exe 34 PID 2468 wrote to memory of 2860 2468 cmd.exe 34 PID 2468 wrote to memory of 2860 2468 cmd.exe 34 PID 2468 wrote to memory of 2740 2468 cmd.exe 35 PID 2468 wrote to memory of 2740 2468 cmd.exe 35 PID 2468 wrote to memory of 2740 2468 cmd.exe 35 PID 2468 wrote to memory of 2740 2468 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe"C:\Users\Admin\AppData\Local\Temp\a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp140D.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2860
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
151B
MD5ae31623ed7caf33051da0d28ae3ea3de
SHA109721daf55695950596ac79ce4a3a3d4a6a9195f
SHA256030e64e2521b5feb294f675dc0537a69c63cf959766c02ea76b5a186e5d43589
SHA512f1a522326a463e7ff3d4f7dce7cd6335c0dd9995bbdb88a88e956fe9bb70b2f84957a69017cfec40af14eab121f90df80c020aca6adb30893c031d79b9ab4d27
-
Filesize
45KB
MD566e220b33b24bec99a124bf81f5cbee1
SHA1147c16eb7bdf357f5061d2acb28736c5d49a0bdb
SHA256a2b83ca2802947ffbb1b191ee1b8326d4dcbac5f4d99bbb25ba816717b50fa3c
SHA51230d753a3fe53a4db078d6479ad16f72de80a17835c30f6269edb184f40542826e4da302be370754adeb51c47e242e1f02583a327f7b7493c6c2aa8e7069eb1c3