Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 18:24
Behavioral task
behavioral1
Sample
TONDDOS.exe
Resource
win7-20240704-en
General
-
Target
TONDDOS.exe
-
Size
75KB
-
MD5
06eaec3a5cb7252e97abd37ddf54197f
-
SHA1
74e6a469391440d9ac7d1adc9441da069d9cfc44
-
SHA256
f323b5b0eae72fea64467cc0cc66af93aedac7a524246b7014ef63b50e325ff7
-
SHA512
514522a7284dcec3a7f8c57370c05086ad0852f63937b39ef0800d8180a978539afb4047e8c064ec4455030ddbe2b8fc1d95b053e2b729e8569425900783a66f
-
SSDEEP
1536:Tu2z1T1y52I40FvL5AbnfxOv0qid0d825Zw9:Tu2xT1y52I40FvebnUvhid0tHw9
Malware Config
Extracted
asyncrat
0.5.7B
Default
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
launcher1.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/xaLN0L9h
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012115-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2968 launcher1.exe -
Loads dropped DLL 1 IoCs
pid Process 2816 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 3 pastebin.com 4 4.tcp.ngrok.io 13 4.tcp.ngrok.io 19 4.tcp.ngrok.io 2 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language launcher1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TONDDOS.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2524 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2668 TONDDOS.exe 2668 TONDDOS.exe 2668 TONDDOS.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2668 TONDDOS.exe Token: SeDebugPrivilege 2968 launcher1.exe Token: SeDebugPrivilege 2968 launcher1.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2784 2668 TONDDOS.exe 31 PID 2668 wrote to memory of 2784 2668 TONDDOS.exe 31 PID 2668 wrote to memory of 2784 2668 TONDDOS.exe 31 PID 2668 wrote to memory of 2784 2668 TONDDOS.exe 31 PID 2668 wrote to memory of 2816 2668 TONDDOS.exe 33 PID 2668 wrote to memory of 2816 2668 TONDDOS.exe 33 PID 2668 wrote to memory of 2816 2668 TONDDOS.exe 33 PID 2668 wrote to memory of 2816 2668 TONDDOS.exe 33 PID 2816 wrote to memory of 2524 2816 cmd.exe 35 PID 2816 wrote to memory of 2524 2816 cmd.exe 35 PID 2816 wrote to memory of 2524 2816 cmd.exe 35 PID 2816 wrote to memory of 2524 2816 cmd.exe 35 PID 2784 wrote to memory of 2536 2784 cmd.exe 36 PID 2784 wrote to memory of 2536 2784 cmd.exe 36 PID 2784 wrote to memory of 2536 2784 cmd.exe 36 PID 2784 wrote to memory of 2536 2784 cmd.exe 36 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37 PID 2816 wrote to memory of 2968 2816 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\TONDDOS.exe"C:\Users\Admin\AppData\Local\Temp\TONDDOS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "launcher1" /tr '"C:\Users\Admin\AppData\Roaming\launcher1.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "launcher1" /tr '"C:\Users\Admin\AppData\Roaming\launcher1.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1E4.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2524
-
-
C:\Users\Admin\AppData\Roaming\launcher1.exe"C:\Users\Admin\AppData\Roaming\launcher1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55b16e48e71df88e9a2ef845793399267
SHA1159885807c7ca25f1e931cc235ae817fce3e3b30
SHA2563d46600abc89ac15191f3256bdb187d624ed30277ef685dc5c9216f012e368fd
SHA51279bd57e3bf0755405714d0a1ae0d35707bd7df5fd6843c5d54e99dbf0671ea0a7dd1593e3fe5fd3c206a80ce8e37602224e31009cf118001eb6d096808f44780
-
Filesize
75KB
MD506eaec3a5cb7252e97abd37ddf54197f
SHA174e6a469391440d9ac7d1adc9441da069d9cfc44
SHA256f323b5b0eae72fea64467cc0cc66af93aedac7a524246b7014ef63b50e325ff7
SHA512514522a7284dcec3a7f8c57370c05086ad0852f63937b39ef0800d8180a978539afb4047e8c064ec4455030ddbe2b8fc1d95b053e2b729e8569425900783a66f