Analysis
-
max time kernel
112s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 13:22
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
8b5d09ffbbfc800578025d9aff31ac68
-
SHA1
cdeea0a7ffb18502d7cae832a13f6294285904ae
-
SHA256
84912d357a09d920ded8c02f0236676f301bd26722ba6ad92165418c007cda89
-
SHA512
a22e73029e4387b70c4242a2beef317b96a32996d523a76580914cd5582b3580f0de9d691aa1e688f74042463f7f8c10c2cd5ce3a3d2b178656c0fd84106a589
-
SSDEEP
768:spDxI6PfZ778/IC8A+X3uazcBRL5JTk1+T4KSBGHmDbD/ph0oX/CLcCaSuEdpqKX:+62ZBwdSJYUbdh9/tiuEdpqKmY7
Malware Config
Extracted
asyncrat
Default
mode-clusters.gl.at.ply.gg:36304
-
delay
1
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023455-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Infected.exe -
Executes dropped EXE 1 IoCs
pid Process 3788 Defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2832 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe 4940 Infected.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4940 Infected.exe Token: SeDebugPrivilege 4940 Infected.exe Token: SeDebugPrivilege 3788 Defender.exe Token: SeDebugPrivilege 3788 Defender.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2340 4940 Infected.exe 89 PID 4940 wrote to memory of 2340 4940 Infected.exe 89 PID 4940 wrote to memory of 1020 4940 Infected.exe 91 PID 4940 wrote to memory of 1020 4940 Infected.exe 91 PID 2340 wrote to memory of 4888 2340 cmd.exe 94 PID 2340 wrote to memory of 4888 2340 cmd.exe 94 PID 1020 wrote to memory of 2832 1020 cmd.exe 95 PID 1020 wrote to memory of 2832 1020 cmd.exe 95 PID 1020 wrote to memory of 3788 1020 cmd.exe 96 PID 1020 wrote to memory of 3788 1020 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBDE1.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\Defender.exe"C:\Users\Admin\AppData\Roaming\Defender.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f47d3f72c34223b0478d580848b72bf4
SHA11151c6bf27bb508ba322a0c825341feb0a56490f
SHA256372b935704cccec8e056568f761382d630b75f1692f661a10096ac909af42b04
SHA5126a87406389612f46da4dd9913b5e47c4db243eb5eb1b5c2aa549aab77a2888555ad4ffef62266eea7743aa394cf735f8ae724004df0349ec8a87acbc7f923d60
-
Filesize
63KB
MD58b5d09ffbbfc800578025d9aff31ac68
SHA1cdeea0a7ffb18502d7cae832a13f6294285904ae
SHA25684912d357a09d920ded8c02f0236676f301bd26722ba6ad92165418c007cda89
SHA512a22e73029e4387b70c4242a2beef317b96a32996d523a76580914cd5582b3580f0de9d691aa1e688f74042463f7f8c10c2cd5ce3a3d2b178656c0fd84106a589