Analysis
-
max time kernel
40s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 22:17
Behavioral task
behavioral1
Sample
buidl.exe
Resource
win10v2004-20240802-en
General
-
Target
buidl.exe
-
Size
63KB
-
MD5
9c2d4871014553f542534fce03805000
-
SHA1
cd44e0ee979718203d896fcc7dcb5cc5077eb721
-
SHA256
9fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
-
SHA512
7d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442
-
SSDEEP
768:PHDvlKazXYN78NwC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXOlKYsN3tlSusV:btTXA9dSJYUbdh9OlAF+usdpqKmY7
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/zs3YKzJ3
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000234bc-9.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation buidl.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 pastebin.com 29 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3996 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe 1216 buidl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1216 buidl.exe Token: SeDebugPrivilege 1436 Discord.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1440 1216 buidl.exe 87 PID 1216 wrote to memory of 1440 1216 buidl.exe 87 PID 1216 wrote to memory of 1708 1216 buidl.exe 89 PID 1216 wrote to memory of 1708 1216 buidl.exe 89 PID 1708 wrote to memory of 3996 1708 cmd.exe 92 PID 1708 wrote to memory of 3996 1708 cmd.exe 92 PID 1440 wrote to memory of 3592 1440 cmd.exe 91 PID 1440 wrote to memory of 3592 1440 cmd.exe 91 PID 1708 wrote to memory of 1436 1708 cmd.exe 94 PID 1708 wrote to memory of 1436 1708 cmd.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\buidl.exe"C:\Users\Admin\AppData\Local\Temp\buidl.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC813.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3996
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD538cfd04a419a844704f90abc089f4276
SHA1ab22fa8058882bc3f43285c1210400035d8b0d5a
SHA256b697dfe955f836290ac8752880d1fb2e478c39597db6d41332810cd1f5006b91
SHA512ff44df5f3e504513b2ff51590e8a802ad29e1658fa88546f33afb784b90a7691c385c9f59892cc52f88fc98203fbd018a3ce1f880684f654472aa3c2b3625be6
-
Filesize
63KB
MD59c2d4871014553f542534fce03805000
SHA1cd44e0ee979718203d896fcc7dcb5cc5077eb721
SHA2569fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
SHA5127d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442