Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 21:28
Behavioral task
behavioral1
Sample
91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe
Resource
win10v2004-20240802-en
General
-
Target
91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe
-
Size
48KB
-
MD5
a7ed4ba445aa61c4632dd6579c212bf5
-
SHA1
a81d766d12a6dd8c3cec537387a089650b34e103
-
SHA256
91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820
-
SHA512
2a0e0afdecf803657f2d67433399dc3119a3b4221334a9c8d7cb3e3e741457aaa26d2edd32377a102f1c539a4ef065cb5296d4cdfe7657993223e675e3fd4bae
-
SSDEEP
768:2u62dT9slTJWUhDuzmo2qLGdFx4mMaYc13WOAo0E0brMIYLECgNREeo7Hkc1KXc9:2u62dT9We2ZamecoOA1brM6CgAHkSpdX
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:22253
eu-central-7075.packetriot.net:6606
eu-central-7075.packetriot.net:7707
eu-central-7075.packetriot.net:8808
eu-central-7075.packetriot.net:1604
eu-central-7075.packetriot.net:22253
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000002343f-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2912 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe Token: SeDebugPrivilege 2080 svchost.exe Token: SeDebugPrivilege 2080 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2248 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 91 PID 5044 wrote to memory of 2248 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 91 PID 5044 wrote to memory of 2248 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 91 PID 5044 wrote to memory of 4956 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 93 PID 5044 wrote to memory of 4956 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 93 PID 5044 wrote to memory of 4956 5044 91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe 93 PID 2248 wrote to memory of 2788 2248 cmd.exe 95 PID 2248 wrote to memory of 2788 2248 cmd.exe 95 PID 2248 wrote to memory of 2788 2248 cmd.exe 95 PID 4956 wrote to memory of 2912 4956 cmd.exe 96 PID 4956 wrote to memory of 2912 4956 cmd.exe 96 PID 4956 wrote to memory of 2912 4956 cmd.exe 96 PID 4956 wrote to memory of 2080 4956 cmd.exe 98 PID 4956 wrote to memory of 2080 4956 cmd.exe 98 PID 4956 wrote to memory of 2080 4956 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe"C:\Users\Admin\AppData\Local\Temp\91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA0E3.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2912
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5859fa2fd501b6991885df466b15f49a8
SHA150b3c55f56a2804b153df857327b22e4b734afe0
SHA256fda1c57a5e4d9b3d7f533bd54a32487be309f98ab866af4e6f02c82be007940a
SHA5120d34ca8daf221ffee691a134bc22ed94deef1477222faf19188e84132fdcc9b14a862cd08ef7d88086923f32416ed95ed607e3d78597ec193ea264c85bf35dda
-
Filesize
48KB
MD5a7ed4ba445aa61c4632dd6579c212bf5
SHA1a81d766d12a6dd8c3cec537387a089650b34e103
SHA25691fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820
SHA5122a0e0afdecf803657f2d67433399dc3119a3b4221334a9c8d7cb3e3e741457aaa26d2edd32377a102f1c539a4ef065cb5296d4cdfe7657993223e675e3fd4bae