Analysis
-
max time kernel
1034s -
max time network
1043s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 21:30
Behavioral task
behavioral1
Sample
Bender Logger V1.5 (still in beta).exe
Resource
win7-20240729-en
General
-
Target
Bender Logger V1.5 (still in beta).exe
-
Size
47KB
-
MD5
474f9807fa8bd9492fe2df927c22f8b8
-
SHA1
6c152c84e860d3e3fda3d42bd930eab9221d2960
-
SHA256
bd82518001b0e98e87bee5331d017872e5a2bafe549811d4953c145d5809e656
-
SHA512
a192c33482eb78552dac6e63d3a7888091a455b4c851fc3c6b6315ac4ffc1e14eb3de8e32784aa1d9ed23e324aff57e145b336e8627b4fd5dbd586246d312b7e
-
SSDEEP
768:quSgNT3ol7xWUpe+7mo2qLTrp5npecYgCPIXK5I0bIPrnnKshevEKwrDnsAs62tO:quSgNT3K52KjnpecrLXabqrnKtj2jxSM
Malware Config
Extracted
asyncrat
0.5.7B
Default
0.tcp.eu.ngrok.io:8080
0.tcp.eu.ngrok.io:13424
AsyncMutex_6SI8OkPnkasa
-
delay
3
-
install
true
-
install_file
win.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120fd-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2444 win.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 51 0.tcp.eu.ngrok.io 61 0.tcp.eu.ngrok.io 76 0.tcp.eu.ngrok.io 92 0.tcp.eu.ngrok.io 23 0.tcp.eu.ngrok.io 88 0.tcp.eu.ngrok.io 69 0.tcp.eu.ngrok.io 2 0.tcp.eu.ngrok.io 18 0.tcp.eu.ngrok.io 32 0.tcp.eu.ngrok.io 41 0.tcp.eu.ngrok.io 54 0.tcp.eu.ngrok.io 57 0.tcp.eu.ngrok.io 83 0.tcp.eu.ngrok.io 7 0.tcp.eu.ngrok.io 14 0.tcp.eu.ngrok.io 27 0.tcp.eu.ngrok.io 45 0.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bender Logger V1.5 (still in beta).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2708 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 Bender Logger V1.5 (still in beta).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 Bender Logger V1.5 (still in beta).exe Token: SeDebugPrivilege 2444 win.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2744 2544 Bender Logger V1.5 (still in beta).exe 29 PID 2544 wrote to memory of 2744 2544 Bender Logger V1.5 (still in beta).exe 29 PID 2544 wrote to memory of 2744 2544 Bender Logger V1.5 (still in beta).exe 29 PID 2544 wrote to memory of 2744 2544 Bender Logger V1.5 (still in beta).exe 29 PID 2544 wrote to memory of 2288 2544 Bender Logger V1.5 (still in beta).exe 31 PID 2544 wrote to memory of 2288 2544 Bender Logger V1.5 (still in beta).exe 31 PID 2544 wrote to memory of 2288 2544 Bender Logger V1.5 (still in beta).exe 31 PID 2544 wrote to memory of 2288 2544 Bender Logger V1.5 (still in beta).exe 31 PID 2744 wrote to memory of 2760 2744 cmd.exe 33 PID 2744 wrote to memory of 2760 2744 cmd.exe 33 PID 2744 wrote to memory of 2760 2744 cmd.exe 33 PID 2744 wrote to memory of 2760 2744 cmd.exe 33 PID 2288 wrote to memory of 2708 2288 cmd.exe 34 PID 2288 wrote to memory of 2708 2288 cmd.exe 34 PID 2288 wrote to memory of 2708 2288 cmd.exe 34 PID 2288 wrote to memory of 2708 2288 cmd.exe 34 PID 2288 wrote to memory of 2444 2288 cmd.exe 35 PID 2288 wrote to memory of 2444 2288 cmd.exe 35 PID 2288 wrote to memory of 2444 2288 cmd.exe 35 PID 2288 wrote to memory of 2444 2288 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bender Logger V1.5 (still in beta).exe"C:\Users\Admin\AppData\Local\Temp\Bender Logger V1.5 (still in beta).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF122.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD5e88f918970f57b85997e663d3ad1a6f6
SHA131d4d3cfbc2085205763aa4072ed564d1e97324b
SHA25609e35d89ef5d0da05627c720112d7efb98557fd13ca4456f5fd3ab20ff439699
SHA5125ee95cc093636815faf6fd2f1c8e38e0453cfca420db752def627e8fb3251ccae129e02886017c73312ab0d1f25981b620ebacabd91ed11214dd3de41a32db77
-
Filesize
47KB
MD5474f9807fa8bd9492fe2df927c22f8b8
SHA16c152c84e860d3e3fda3d42bd930eab9221d2960
SHA256bd82518001b0e98e87bee5331d017872e5a2bafe549811d4953c145d5809e656
SHA512a192c33482eb78552dac6e63d3a7888091a455b4c851fc3c6b6315ac4ffc1e14eb3de8e32784aa1d9ed23e324aff57e145b336e8627b4fd5dbd586246d312b7e