Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 11:25
General
-
Target
De4dot [Modded ArmDot].rar
-
Size
1.6MB
-
MD5
342e5985f616e188d6c8e36646c64afa
-
SHA1
5a63d72d930d84099132e26191d7744ebc59eebb
-
SHA256
e78ca92972b835e979464db8ace1c68f41091a442caff0009076155c8fefe285
-
SHA512
eafb9b599cf8a4fc4f598745a0c21e9358560fcfac4d6e32674bc7cdd1e391d11a831fe0519005c767071a030fc55fae71f45373406d150a3923164553c994c1
-
SSDEEP
49152:sC+xacTJtRU+AkF97tPnq+xacTJtRU+A9yVKn2IuA/:OJ2wD7t/J2M83uG
Malware Config
Extracted
asyncrat
5.0.5
D4Dot
154.61.75.91:4449
-
delay
1
-
install
true
-
install_file
D4dot.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/832-47-0x00000000010D0000-0x0000000001112000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation de4dot -64.exe -
Executes dropped EXE 3 IoCs
pid Process 832 de4dot -64.exe 720 D4dot.exe 4332 de4dot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 840 timeout.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings OpenWith.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe 832 de4dot -64.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 4572 7zG.exe Token: 35 4572 7zG.exe Token: SeSecurityPrivilege 4572 7zG.exe Token: SeSecurityPrivilege 4572 7zG.exe Token: SeDebugPrivilege 832 de4dot -64.exe Token: SeDebugPrivilege 720 D4dot.exe Token: SeDebugPrivilege 4332 de4dot.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4572 7zG.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe 3456 OpenWith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 832 wrote to memory of 2204 832 de4dot -64.exe 100 PID 832 wrote to memory of 2204 832 de4dot -64.exe 100 PID 832 wrote to memory of 4852 832 de4dot -64.exe 101 PID 832 wrote to memory of 4852 832 de4dot -64.exe 101 PID 4852 wrote to memory of 840 4852 cmd.exe 104 PID 4852 wrote to memory of 840 4852 cmd.exe 104 PID 2204 wrote to memory of 636 2204 cmd.exe 105 PID 2204 wrote to memory of 636 2204 cmd.exe 105 PID 4852 wrote to memory of 720 4852 cmd.exe 106 PID 4852 wrote to memory of 720 4852 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot].rar"1⤵
- Modifies registry class
PID:1284
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3456
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4272
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\" -spe -an -ai#7zMap11878:102:7zEvent268611⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4572
-
C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot -64.exe"C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot -64.exe" "C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "D4dot" /tr '"C:\Users\Admin\AppData\Roaming\D4dot.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "D4dot" /tr '"C:\Users\Admin\AppData\Roaming\D4dot.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8AA7.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Users\Admin\AppData\Roaming\D4dot.exe"C:\Users\Admin\AppData\Roaming\D4dot.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
-
C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot.exe"C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot.exe" "C:\Users\Admin\Desktop\De4dot [Modded ArmDot]\de4dot -64.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5722e4838090d485c3140e509074f1375
SHA1891e8cfb3b0f1e7c3f441ee1f2869eab2cb94adf
SHA2565d25b8532205c9ed34c0cb088f70877966da0dcca377fd1e315a8e60179c1ac0
SHA512add32ac91a93ff537a418661ab1f0fdc63544f37f76a948f32bdbf343ddd32f8e3dff987d4c1fe4b75e8fddc68efe6016417e5f16034037218db840e59d62444
-
Filesize
864KB
MD55adaa98a0b8e6411899f38807992afc6
SHA1286990f8674e0369a9c27f4ffc346383c5c4b03e
SHA256956a589c4da96ec8386890e9500918dfbfbab1caaae0adc0b9366fa25dc46e52
SHA512700be06def67aa38426cef84d1394f2eb6b30a198857f48df0d6449e85251ee8af764f2574c66e769980275613738056c68c4dfbd0bd74dc255e5dd90254fff6
-
Filesize
386B
MD57d85bf81018e3346cc1360ab54891b53
SHA139a189f5eb68c9d7ddc83eff779bf0097f4a485a
SHA2566ac7546263b4c4805085897b4d871e46dfbe9b2e52a19b0e23ae7bc37f473bc1
SHA512ab6c2dc32b926b4b1c5a683caa5c2971bac6860907fb5204b6a30c49d1decb0d41d0d1f3f9e4b1aa6e3096e25691d285440c3c74172d20b148ad527dc91132e2