Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
2f528c70be4abd7138859b6fa0990b3e.exe
Resource
win7-20240708-en
General
-
Target
2f528c70be4abd7138859b6fa0990b3e.exe
-
Size
1.2MB
-
MD5
2f528c70be4abd7138859b6fa0990b3e
-
SHA1
a917e6ab7b5a2ead8fd23829678db650fef60b46
-
SHA256
c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802
-
SHA512
a408c3af7a5942bc415727c40d5ed0b4569b48937d65871ddaf1ab458fb6566a36f7114c758b34bdb237e6d1f6c9d74755a4ff53a88da20e31e353689739e933
-
SSDEEP
24576:/jAAahFflN4/3qqDZykMnAN4V4JeR7tluqCo94Z:cxDNKuABUxjuHom
Malware Config
Extracted
asyncrat
0.5.6D
Default
seznam.zapto.org:6606
seznam.zapto.org:7707
seznam.zapto.org:8808
tpfypmaupoo
-
delay
5
-
install
true
-
install_file
microosofte.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1596-5-0x00000000005D0000-0x00000000005E2000-memory.dmp family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2720 microosofte.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microosofte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f528c70be4abd7138859b6fa0990b3e.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2944 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1596 2f528c70be4abd7138859b6fa0990b3e.exe 1596 2f528c70be4abd7138859b6fa0990b3e.exe 1596 2f528c70be4abd7138859b6fa0990b3e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 2f528c70be4abd7138859b6fa0990b3e.exe Token: SeDebugPrivilege 2720 microosofte.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2808 1596 2f528c70be4abd7138859b6fa0990b3e.exe 30 PID 1596 wrote to memory of 2808 1596 2f528c70be4abd7138859b6fa0990b3e.exe 30 PID 1596 wrote to memory of 2808 1596 2f528c70be4abd7138859b6fa0990b3e.exe 30 PID 1596 wrote to memory of 2808 1596 2f528c70be4abd7138859b6fa0990b3e.exe 30 PID 1596 wrote to memory of 2552 1596 2f528c70be4abd7138859b6fa0990b3e.exe 31 PID 1596 wrote to memory of 2552 1596 2f528c70be4abd7138859b6fa0990b3e.exe 31 PID 1596 wrote to memory of 2552 1596 2f528c70be4abd7138859b6fa0990b3e.exe 31 PID 1596 wrote to memory of 2552 1596 2f528c70be4abd7138859b6fa0990b3e.exe 31 PID 2552 wrote to memory of 2944 2552 cmd.exe 34 PID 2552 wrote to memory of 2944 2552 cmd.exe 34 PID 2552 wrote to memory of 2944 2552 cmd.exe 34 PID 2552 wrote to memory of 2944 2552 cmd.exe 34 PID 2808 wrote to memory of 1920 2808 cmd.exe 35 PID 2808 wrote to memory of 1920 2808 cmd.exe 35 PID 2808 wrote to memory of 1920 2808 cmd.exe 35 PID 2808 wrote to memory of 1920 2808 cmd.exe 35 PID 2552 wrote to memory of 2720 2552 cmd.exe 36 PID 2552 wrote to memory of 2720 2552 cmd.exe 36 PID 2552 wrote to memory of 2720 2552 cmd.exe 36 PID 2552 wrote to memory of 2720 2552 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f528c70be4abd7138859b6fa0990b3e.exe"C:\Users\Admin\AppData\Local\Temp\2f528c70be4abd7138859b6fa0990b3e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn 2f528c70be4abd7138859b6fa0990b3e /tr '"C:\Users\Admin\AppData\Roaming\microosofte.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn 2f528c70be4abd7138859b6fa0990b3e /tr '"C:\Users\Admin\AppData\Roaming\microosofte.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3514.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\microosofte.exe"C:\Users\Admin\AppData\Roaming\microosofte.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
155B
MD596b522e88083198873b38afca162043a
SHA1ee0b0f3c7e56f14049b6e66efdee09e6c4cc71e4
SHA256993ee0fd98b77e152bee8f0b7ac0be1a180e5644d3bdcfb2791ac0fcc92cb260
SHA512614c239c15ad59003cb27809e4f6db6b73e547c439841c6b1637aa9ae955b50b597dbd6c863fe97f36c895d17f3041c8341032799af334abb89d79dd703d4c8e
-
Filesize
1.2MB
MD52f528c70be4abd7138859b6fa0990b3e
SHA1a917e6ab7b5a2ead8fd23829678db650fef60b46
SHA256c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802
SHA512a408c3af7a5942bc415727c40d5ed0b4569b48937d65871ddaf1ab458fb6566a36f7114c758b34bdb237e6d1f6c9d74755a4ff53a88da20e31e353689739e933