Analysis
-
max time kernel
599s -
max time network
529s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
31-07-2024 15:08
General
-
Target
231.exe
-
Size
63KB
-
MD5
1b8eea1226cd913da97c0c0b8a806b18
-
SHA1
4320bde806e4fb5792be6bfb2e0b45ae30033fa0
-
SHA256
4476d0eb2a47cb9bfe3155abf0a1603de727dd127f4df099b344df56c22c0d67
-
SHA512
70fca344d74efe3e1bf9268e36bd2aac698e69cde340559f5a0df603bf996d06f6b60920cf02ecf19c8532f6a6d6210a4c9ad54a61ddbf12541ae0cfee3da7f1
-
SSDEEP
1536:zZgPH9F4s1THE6HTIiTEulumGbb+wAe+EhGG0kpqKmY7:zZgPH9F4sBHLTIiTnGbb+xmuvz
Malware Config
Extracted
asyncrat
1.2
Default
stores-less.gl.at.ply.gg:45080
AtomRatMutex_penka
-
delay
1
-
install
true
-
install_file
piskat.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000900000001ab57-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1756 piskat.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2380 timeout.exe 1800 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 2448 231.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 868 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2448 231.exe Token: SeDebugPrivilege 868 taskmgr.exe Token: SeSystemProfilePrivilege 868 taskmgr.exe Token: SeCreateGlobalPrivilege 868 taskmgr.exe Token: SeDebugPrivilege 1756 piskat.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe 868 taskmgr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1372 2448 231.exe 75 PID 2448 wrote to memory of 1372 2448 231.exe 75 PID 2448 wrote to memory of 4696 2448 231.exe 77 PID 2448 wrote to memory of 4696 2448 231.exe 77 PID 1372 wrote to memory of 4720 1372 cmd.exe 79 PID 1372 wrote to memory of 4720 1372 cmd.exe 79 PID 4696 wrote to memory of 2380 4696 cmd.exe 80 PID 4696 wrote to memory of 2380 4696 cmd.exe 80 PID 4696 wrote to memory of 1756 4696 cmd.exe 81 PID 4696 wrote to memory of 1756 4696 cmd.exe 81 PID 1756 wrote to memory of 1988 1756 piskat.exe 84 PID 1756 wrote to memory of 1988 1756 piskat.exe 84 PID 1756 wrote to memory of 1420 1756 piskat.exe 85 PID 1756 wrote to memory of 1420 1756 piskat.exe 85 PID 1420 wrote to memory of 1800 1420 cmd.exe 88 PID 1420 wrote to memory of 1800 1420 cmd.exe 88 PID 1988 wrote to memory of 812 1988 cmd.exe 89 PID 1988 wrote to memory of 812 1988 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\231.exe"C:\Users\Admin\AppData\Local\Temp\231.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "piskat" /tr '"C:\Users\Admin\AppData\Roaming\piskat.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "piskat" /tr '"C:\Users\Admin\AppData\Roaming\piskat.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7F13.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2380
-
-
C:\Users\Admin\AppData\Roaming\piskat.exe"C:\Users\Admin\AppData\Roaming\piskat.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "piskat"4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "piskat"5⤵PID:812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9F05.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:1800
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD533f2e682c09506708c90a031a6908fa1
SHA18816fc2831d8f8543d11d89ce0839df01871041e
SHA2562a83781f3e417f80e0e77d906687572c4adefd25a5732fed9a2918da58f0d404
SHA51222a79bfbe69353810872a7406d7225c89ef0ca7f64d1561f5c35e093983bddb31aaa8aa874c36a2db4ac72116f8d4d40b8655cf8563e10aedde86ee9017a4651
-
Filesize
155B
MD5b8169c1b7e90d66943021efb945a6be5
SHA1f714ca12e1084eb710199d8181bf4de558488c52
SHA2568d80af3926845bd689d6f3366ae0ea01ef75b012203cd5dff4a3ca8e306eba5f
SHA512286a774971d8f7aa4c9d552cbf2785c5d58d3844f27322a34fdf866d6539963802276fd0c0ed8442953a553ee77d7bd58ad51791052a3261cda7345bc230b466
-
Filesize
63KB
MD51b8eea1226cd913da97c0c0b8a806b18
SHA14320bde806e4fb5792be6bfb2e0b45ae30033fa0
SHA2564476d0eb2a47cb9bfe3155abf0a1603de727dd127f4df099b344df56c22c0d67
SHA51270fca344d74efe3e1bf9268e36bd2aac698e69cde340559f5a0df603bf996d06f6b60920cf02ecf19c8532f6a6d6210a4c9ad54a61ddbf12541ae0cfee3da7f1