Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 08:14
Behavioral task
behavioral1
Sample
75876b62b3fdb128d9b3dfae6e9cebf0N.exe
Resource
win7-20240704-en
General
-
Target
75876b62b3fdb128d9b3dfae6e9cebf0N.exe
-
Size
261KB
-
MD5
75876b62b3fdb128d9b3dfae6e9cebf0
-
SHA1
27e2a11fc6678b8367c19bcb1b50c52c06ae740a
-
SHA256
b87a03ff94628c6e231cc9681e5b895be4cc8e70dc8e2194367623824aea51eb
-
SHA512
c7f3fe892e25095be5178d9308df95735dbebe8aa0d0571ff4f1ad8bbc5b4c25215f1ddb2d4042367b77191b7a8384e9ebd93b25dba22f30218383f2077eb9c1
-
SSDEEP
3072:ThJBLTM3UfcVdoQDQlpebbSt/gZHP9Y05sK+5V4bvoUwXj3z:ThDLTM3UfquiWp8bS/Q95sK+5V4L2D
Malware Config
Extracted
asyncrat
5.0.5
Nagi
91.188.254.203:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
windowslauncher.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023385-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 75876b62b3fdb128d9b3dfae6e9cebf0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 windowslauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3492 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe 2136 windowslauncher.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe Token: SeDebugPrivilege 2136 windowslauncher.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1448 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 87 PID 4652 wrote to memory of 1448 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 87 PID 4652 wrote to memory of 2640 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 89 PID 4652 wrote to memory of 2640 4652 75876b62b3fdb128d9b3dfae6e9cebf0N.exe 89 PID 2640 wrote to memory of 3492 2640 cmd.exe 91 PID 2640 wrote to memory of 3492 2640 cmd.exe 91 PID 1448 wrote to memory of 1232 1448 cmd.exe 92 PID 1448 wrote to memory of 1232 1448 cmd.exe 92 PID 2640 wrote to memory of 2136 2640 cmd.exe 95 PID 2640 wrote to memory of 2136 2640 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\75876b62b3fdb128d9b3dfae6e9cebf0N.exe"C:\Users\Admin\AppData\Local\Temp\75876b62b3fdb128d9b3dfae6e9cebf0N.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowslauncher" /tr '"C:\Users\Admin\AppData\Roaming\windowslauncher.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windowslauncher" /tr '"C:\Users\Admin\AppData\Roaming\windowslauncher.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp79E3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3492
-
-
C:\Users\Admin\AppData\Roaming\windowslauncher.exe"C:\Users\Admin\AppData\Roaming\windowslauncher.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD5ebc6b2cada51453d11019a89ec836ab6
SHA100db050970255abb4502e3ddadd14db761d5605f
SHA256c21401a562f76f193dfc598d868f8a7afad4a4b879fc3a0f3b46eb56aac19e27
SHA512cb694bba64fcf710b44eef8f5de0de0afd5744fa336ad4a286ca34e716a5ec07dcd8cc9cbeb17f4c2a0d6ecb2355bbbf1c5decd19131f86181b15af866d4eb6f
-
Filesize
261KB
MD575876b62b3fdb128d9b3dfae6e9cebf0
SHA127e2a11fc6678b8367c19bcb1b50c52c06ae740a
SHA256b87a03ff94628c6e231cc9681e5b895be4cc8e70dc8e2194367623824aea51eb
SHA512c7f3fe892e25095be5178d9308df95735dbebe8aa0d0571ff4f1ad8bbc5b4c25215f1ddb2d4042367b77191b7a8384e9ebd93b25dba22f30218383f2077eb9c1