Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
ABA NEW ORDER No.2400228341.pdf.exe
Resource
win7-20240705-en
General
-
Target
ABA NEW ORDER No.2400228341.pdf.exe
-
Size
2.1MB
-
MD5
d9d0ba1c1cc0dd9243f36fba8b1147ad
-
SHA1
eae15f17ee26ede826b934733e16762cd61c89fa
-
SHA256
37f7dc1e5403ed4babd766ca88445f0c0fd555af19a5b669123660c262cc3f58
-
SHA512
304503d20998426c25f8f12ff9907831e0184b5ac911a0ce45addec385cac82dc070a56ad8630b404a41023fb56140dda9498d8f1a659a77df2b944ebb6da6b9
-
SSDEEP
6144:2TrjyPf1/pNLbtbTvspnI5p3YCmMuHrXOrfE8HiTAnnQUoJwS4LY5qhR:2TWBnjspnIb//XT7EAQPn4LJD
Malware Config
Extracted
asyncrat
0.5.8
2MONEY
twart.myfirewall.org:14143
FEjYSsXzhpZixwA
-
delay
20
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3268 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4160 set thread context of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3088 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe 4852 installutil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4852 installutil.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4160 wrote to memory of 4852 4160 ABA NEW ORDER No.2400228341.pdf.exe 91 PID 4852 wrote to memory of 1440 4852 installutil.exe 96 PID 4852 wrote to memory of 1440 4852 installutil.exe 96 PID 4852 wrote to memory of 1440 4852 installutil.exe 96 PID 4852 wrote to memory of 1612 4852 installutil.exe 98 PID 4852 wrote to memory of 1612 4852 installutil.exe 98 PID 4852 wrote to memory of 1612 4852 installutil.exe 98 PID 1440 wrote to memory of 4696 1440 cmd.exe 100 PID 1440 wrote to memory of 4696 1440 cmd.exe 100 PID 1440 wrote to memory of 4696 1440 cmd.exe 100 PID 1612 wrote to memory of 3088 1612 cmd.exe 101 PID 1612 wrote to memory of 3088 1612 cmd.exe 101 PID 1612 wrote to memory of 3088 1612 cmd.exe 101 PID 1612 wrote to memory of 3268 1612 cmd.exe 102 PID 1612 wrote to memory of 3268 1612 cmd.exe 102 PID 1612 wrote to memory of 3268 1612 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ABA NEW ORDER No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\ABA NEW ORDER No.2400228341.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF349.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3268
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
154B
MD5ffd212989fb4da7b67f74260234a5ee4
SHA10faad48ec8d4d20c74466a7737635fa32dbad305
SHA2565f56ef18d134f668013da93fa5bd30343ee491999727083384f725465bebf85d
SHA512cf144007fdbc3b216dd834948d228eb8bfad74686ebabb416d8b9ffcfcc06022707a5dd1fecbf0f9036e9bd63583955bf687321fb58c7c36a20c9088de22c26c