Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
7b05be5398ce2cbc424d40b82b8bb4fe.exe
Resource
win7-20240729-en
General
-
Target
7b05be5398ce2cbc424d40b82b8bb4fe.exe
-
Size
663KB
-
MD5
7b05be5398ce2cbc424d40b82b8bb4fe
-
SHA1
6c158dc6c7324e5b76bb9d89916261c778c23f63
-
SHA256
472819b55a8804b4d8787f5e45cc9b1aeb1026d5819f06e91bbc022d53ccae5c
-
SHA512
ddb856adf6ddf8d8f696b48a1b5d27584be742bc9f47e4bf07b0dca101be9afa598a087d7bc8e5dc9c0d515d0e7333093ef4c597bd8d3197a2e340caf9da8257
-
SSDEEP
12288:fU3929BC4rqhpqBHIA01a29EprIHAJp3UadAAHkR:fU89BNuhaoEprIHAJpkoAr
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.252.165.55:1986
AsyncMutex_5SI8OkPnk
-
delay
3
-
install
true
-
install_file
Notes.exe
-
install_folder
%AppData%
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1484 powershell.exe 2748 powershell.exe 628 powershell.exe 1872 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2944 Notes.exe 2304 Notes.exe -
Loads dropped DLL 1 IoCs
pid Process 2904 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1956 set thread context of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 2944 set thread context of 2304 2944 Notes.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b05be5398ce2cbc424d40b82b8bb4fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b05be5398ce2cbc424d40b82b8bb4fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2664 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1420 schtasks.exe 2808 schtasks.exe 3016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1484 powershell.exe 2748 powershell.exe 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 1872 powershell.exe 628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 2304 Notes.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1484 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 31 PID 1956 wrote to memory of 1484 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 31 PID 1956 wrote to memory of 1484 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 31 PID 1956 wrote to memory of 1484 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 31 PID 1956 wrote to memory of 2748 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 33 PID 1956 wrote to memory of 2748 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 33 PID 1956 wrote to memory of 2748 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 33 PID 1956 wrote to memory of 2748 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 33 PID 1956 wrote to memory of 2808 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 35 PID 1956 wrote to memory of 2808 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 35 PID 1956 wrote to memory of 2808 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 35 PID 1956 wrote to memory of 2808 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 35 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 1956 wrote to memory of 2992 1956 7b05be5398ce2cbc424d40b82b8bb4fe.exe 37 PID 2992 wrote to memory of 1468 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 38 PID 2992 wrote to memory of 1468 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 38 PID 2992 wrote to memory of 1468 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 38 PID 2992 wrote to memory of 1468 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 38 PID 2992 wrote to memory of 2904 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 40 PID 2992 wrote to memory of 2904 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 40 PID 2992 wrote to memory of 2904 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 40 PID 2992 wrote to memory of 2904 2992 7b05be5398ce2cbc424d40b82b8bb4fe.exe 40 PID 1468 wrote to memory of 3016 1468 cmd.exe 42 PID 1468 wrote to memory of 3016 1468 cmd.exe 42 PID 1468 wrote to memory of 3016 1468 cmd.exe 42 PID 1468 wrote to memory of 3016 1468 cmd.exe 42 PID 2904 wrote to memory of 2664 2904 cmd.exe 43 PID 2904 wrote to memory of 2664 2904 cmd.exe 43 PID 2904 wrote to memory of 2664 2904 cmd.exe 43 PID 2904 wrote to memory of 2664 2904 cmd.exe 43 PID 2904 wrote to memory of 2944 2904 cmd.exe 44 PID 2904 wrote to memory of 2944 2904 cmd.exe 44 PID 2904 wrote to memory of 2944 2904 cmd.exe 44 PID 2904 wrote to memory of 2944 2904 cmd.exe 44 PID 2944 wrote to memory of 628 2944 Notes.exe 45 PID 2944 wrote to memory of 628 2944 Notes.exe 45 PID 2944 wrote to memory of 628 2944 Notes.exe 45 PID 2944 wrote to memory of 628 2944 Notes.exe 45 PID 2944 wrote to memory of 1872 2944 Notes.exe 47 PID 2944 wrote to memory of 1872 2944 Notes.exe 47 PID 2944 wrote to memory of 1872 2944 Notes.exe 47 PID 2944 wrote to memory of 1872 2944 Notes.exe 47 PID 2944 wrote to memory of 1420 2944 Notes.exe 49 PID 2944 wrote to memory of 1420 2944 Notes.exe 49 PID 2944 wrote to memory of 1420 2944 Notes.exe 49 PID 2944 wrote to memory of 1420 2944 Notes.exe 49 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51 PID 2944 wrote to memory of 2304 2944 Notes.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b05be5398ce2cbc424d40b82b8bb4fe.exe"C:\Users\Admin\AppData\Local\Temp\7b05be5398ce2cbc424d40b82b8bb4fe.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\7b05be5398ce2cbc424d40b82b8bb4fe.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZjHuIvPfp.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZjHuIvPfp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA6C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\7b05be5398ce2cbc424d40b82b8bb4fe.exe"C:\Users\Admin\AppData\Local\Temp\7b05be5398ce2cbc424d40b82b8bb4fe.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Notes" /tr '"C:\Users\Admin\AppData\Roaming\Notes.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Notes" /tr '"C:\Users\Admin\AppData\Roaming\Notes.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp197A.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2664
-
-
C:\Users\Admin\AppData\Roaming\Notes.exe"C:\Users\Admin\AppData\Roaming\Notes.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Notes.exe"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZjHuIvPfp.exe"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZjHuIvPfp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E37.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1420
-
-
C:\Users\Admin\AppData\Roaming\Notes.exe"C:\Users\Admin\AppData\Roaming\Notes.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
149B
MD576bb109af47830e7a333c2e8c0db258f
SHA11cc4674edd57f35bffef877a6a9a52671bb7ad93
SHA256e11609af0ac9c75a87ae5838652f18f6dee9a21863d40ad0c766aafe67f16207
SHA512f5bb45bbbe93005081d066234f043a23163d93d2669ad9f2ff99b78d136bbbe968cfdcc041ba1def89ad1331feba7dd152cbdf1b37593046940b4fdb206a0d94
-
Filesize
1KB
MD5d1cca9e7937e166c7518437b2782cea8
SHA1e5c6edb1371ce4a155816a5dd1eaf31774dcec1e
SHA256560eebdba0863684169ee5066845265d68710d2a328b7a94692f4e721a926aeb
SHA5123449f03fca271206e5cb04d04d753014e0c803e1e029699cf36ee6f2e6977c92fb3fa6fca14080c1c5797f1f6494790cb84af14abd03440341b51d288b9dcbf6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fd30a9891dac22a4bec4ff64c26f1c88
SHA14cfc9d3ca2bb7f447626c28e0ffffc38f9184bb1
SHA256a7010911a750625bf4a1c9132a6a178466c7baee7e846a3367ad93d9ef774568
SHA512d384cd3bcc731b8b132ade4bb3f45aa2e4274d5868c8a5d2a849ff43f772a8ddca00a347d240db533c892a9b9da04d64fa2f76c6a7280c11cef59ca69070ea5b
-
Filesize
663KB
MD57b05be5398ce2cbc424d40b82b8bb4fe
SHA16c158dc6c7324e5b76bb9d89916261c778c23f63
SHA256472819b55a8804b4d8787f5e45cc9b1aeb1026d5819f06e91bbc022d53ccae5c
SHA512ddb856adf6ddf8d8f696b48a1b5d27584be742bc9f47e4bf07b0dca101be9afa598a087d7bc8e5dc9c0d515d0e7333093ef4c597bd8d3197a2e340caf9da8257