Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 02:15
Behavioral task
behavioral1
Sample
flemme.exe
Resource
win7-20240704-en
General
-
Target
flemme.exe
-
Size
112KB
-
MD5
2dd4a3e79a430fcf80e0c16c059c4c2c
-
SHA1
b32b851bb2746acfa2035d6765f7827e5880debb
-
SHA256
5969e616a32e7cb09dd32ddca0c37e989a6131edb5c4a7b4367400c3f0e8527e
-
SHA512
cae7ef83d8eb0f77d018dae6327b46cbb61e68623d64551492f883b9903a00ff410a9bda7c84f4348497e55b34490b315f855b95288e71710076cb246863a6a4
-
SSDEEP
3072:IucJTUUk2QGjf93SybKeYOQpiGU0tFsHEx:IucjNrr9CybEOq5
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
zou2AAxxuspP
-
delay
3
-
install
true
-
install_file
executorroblox.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002336d-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation flemme.exe -
Executes dropped EXE 1 IoCs
pid Process 5000 executorroblox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language executorroblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flemme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3924 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4288 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe 988 flemme.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 988 flemme.exe Token: SeDebugPrivilege 5000 executorroblox.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 988 wrote to memory of 2316 988 flemme.exe 87 PID 988 wrote to memory of 2316 988 flemme.exe 87 PID 988 wrote to memory of 2316 988 flemme.exe 87 PID 988 wrote to memory of 3800 988 flemme.exe 89 PID 988 wrote to memory of 3800 988 flemme.exe 89 PID 988 wrote to memory of 3800 988 flemme.exe 89 PID 2316 wrote to memory of 4288 2316 cmd.exe 91 PID 2316 wrote to memory of 4288 2316 cmd.exe 91 PID 2316 wrote to memory of 4288 2316 cmd.exe 91 PID 3800 wrote to memory of 3924 3800 cmd.exe 92 PID 3800 wrote to memory of 3924 3800 cmd.exe 92 PID 3800 wrote to memory of 3924 3800 cmd.exe 92 PID 3800 wrote to memory of 5000 3800 cmd.exe 93 PID 3800 wrote to memory of 5000 3800 cmd.exe 93 PID 3800 wrote to memory of 5000 3800 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\flemme.exe"C:\Users\Admin\AppData\Local\Temp\flemme.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "executorroblox" /tr '"C:\Users\Admin\AppData\Roaming\executorroblox.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "executorroblox" /tr '"C:\Users\Admin\AppData\Roaming\executorroblox.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB6DC.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3924
-
-
C:\Users\Admin\AppData\Roaming\executorroblox.exe"C:\Users\Admin\AppData\Roaming\executorroblox.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5b625d5df6fd74d495433d7ca93364ddb
SHA1c909de770b3494ad027c7bd766a296bc060fb4b7
SHA256b64c76e182e1c41ca5d9a43b5498344cfe283d3b98694999e75476c5384011c4
SHA51222d78cbaf5300393c86e6f112f98bcdf95b29e755f13b31faa10fcdc568a362af0e1442a228cc4a9002141474dacfb945918ea353eaf17e62c39f808a2cc3375
-
Filesize
112KB
MD52dd4a3e79a430fcf80e0c16c059c4c2c
SHA1b32b851bb2746acfa2035d6765f7827e5880debb
SHA2565969e616a32e7cb09dd32ddca0c37e989a6131edb5c4a7b4367400c3f0e8527e
SHA512cae7ef83d8eb0f77d018dae6327b46cbb61e68623d64551492f883b9903a00ff410a9bda7c84f4348497e55b34490b315f855b95288e71710076cb246863a6a4