Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe
Resource
win7-20240704-en
General
-
Target
c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe
-
Size
1.2MB
-
MD5
2f528c70be4abd7138859b6fa0990b3e
-
SHA1
a917e6ab7b5a2ead8fd23829678db650fef60b46
-
SHA256
c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802
-
SHA512
a408c3af7a5942bc415727c40d5ed0b4569b48937d65871ddaf1ab458fb6566a36f7114c758b34bdb237e6d1f6c9d74755a4ff53a88da20e31e353689739e933
-
SSDEEP
24576:/jAAahFflN4/3qqDZykMnAN4V4JeR7tluqCo94Z:cxDNKuABUxjuHom
Malware Config
Extracted
asyncrat
0.5.6D
Default
seznam.zapto.org:6606
seznam.zapto.org:7707
seznam.zapto.org:8808
tpfypmaupoo
-
delay
5
-
install
true
-
install_file
microosofte.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4032-11-0x0000000008020000-0x0000000008032000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 microosofte.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microosofte.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4420 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1256 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe Token: SeDebugPrivilege 4608 microosofte.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4032 wrote to memory of 1128 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 101 PID 4032 wrote to memory of 1128 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 101 PID 4032 wrote to memory of 1128 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 101 PID 4032 wrote to memory of 5084 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 103 PID 4032 wrote to memory of 5084 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 103 PID 4032 wrote to memory of 5084 4032 c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe 103 PID 1128 wrote to memory of 1256 1128 cmd.exe 105 PID 1128 wrote to memory of 1256 1128 cmd.exe 105 PID 1128 wrote to memory of 1256 1128 cmd.exe 105 PID 5084 wrote to memory of 4420 5084 cmd.exe 106 PID 5084 wrote to memory of 4420 5084 cmd.exe 106 PID 5084 wrote to memory of 4420 5084 cmd.exe 106 PID 5084 wrote to memory of 4608 5084 cmd.exe 108 PID 5084 wrote to memory of 4608 5084 cmd.exe 108 PID 5084 wrote to memory of 4608 5084 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe"C:\Users\Admin\AppData\Local\Temp\c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802 /tr '"C:\Users\Admin\AppData\Roaming\microosofte.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802 /tr '"C:\Users\Admin\AppData\Roaming\microosofte.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7376.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4420
-
-
C:\Users\Admin\AppData\Roaming\microosofte.exe"C:\Users\Admin\AppData\Roaming\microosofte.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4228,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:81⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD59fdf6525e1a5fb97d78b2ad05ca769da
SHA1b3cdfc796bbf91a3dc70f2aa88c347751242cf24
SHA2562abb57701481b350271e2aaa261c7aeb7fc09ceff75203517194d7c237280630
SHA5120fe9a21346a008262aa36475269f95a0ae8b56ce3a61425d98f6b51d1192d41f11f7dcc3f82e3caf281cd6058866fa2e1838e36516c5a3d081ef9a0aa0ac6178
-
Filesize
1.2MB
MD52f528c70be4abd7138859b6fa0990b3e
SHA1a917e6ab7b5a2ead8fd23829678db650fef60b46
SHA256c603849b79b5472bf8733f8c5d7f39bd886e6ce3d61b3cc7d7b4278e3a599802
SHA512a408c3af7a5942bc415727c40d5ed0b4569b48937d65871ddaf1ab458fb6566a36f7114c758b34bdb237e6d1f6c9d74755a4ff53a88da20e31e353689739e933