Analysis
-
max time kernel
36s -
max time network
49s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-08-2024 22:17
Behavioral task
behavioral1
Sample
buidl.exe
Resource
win10v2004-20240802-en
General
-
Target
buidl.exe
-
Size
63KB
-
MD5
9c2d4871014553f542534fce03805000
-
SHA1
cd44e0ee979718203d896fcc7dcb5cc5077eb721
-
SHA256
9fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
-
SHA512
7d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442
-
SSDEEP
768:PHDvlKazXYN78NwC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXOlKYsN3tlSusV:btTXA9dSJYUbdh9OlAF+usdpqKmY7
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/zs3YKzJ3
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000002aaa9-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2124 Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 6140 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe 1288 buidl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1288 buidl.exe Token: SeDebugPrivilege 2124 Discord.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1288 wrote to memory of 5552 1288 buidl.exe 82 PID 1288 wrote to memory of 5552 1288 buidl.exe 82 PID 1288 wrote to memory of 5088 1288 buidl.exe 83 PID 1288 wrote to memory of 5088 1288 buidl.exe 83 PID 5552 wrote to memory of 2432 5552 cmd.exe 86 PID 5552 wrote to memory of 2432 5552 cmd.exe 86 PID 5088 wrote to memory of 6140 5088 cmd.exe 87 PID 5088 wrote to memory of 6140 5088 cmd.exe 87 PID 5088 wrote to memory of 2124 5088 cmd.exe 88 PID 5088 wrote to memory of 2124 5088 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\buidl.exe"C:\Users\Admin\AppData\Local\Temp\buidl.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5552 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9A7B.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:6140
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5951d07afc387dc7c00ba456a1f479417
SHA155ebeb30d39434cf6b68a0327742be6667c162ad
SHA256d1804cac87c49b86a4f873f609f2f64a6eb2dd5eab19cc30257dfc148816c350
SHA5122a562f83b753d67c88bd008e6afc84f882deebaa70b814d2e1b321f77dc59299b7824d8f05eb3046ad25df4ab097c1a7f87059dd6e98f27160e38078175b933e
-
Filesize
63KB
MD59c2d4871014553f542534fce03805000
SHA1cd44e0ee979718203d896fcc7dcb5cc5077eb721
SHA2569fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
SHA5127d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442