Analysis
-
max time kernel
1047s -
max time network
1056s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 21:30
Behavioral task
behavioral1
Sample
Bender Logger V1.5 (still in beta).exe
Resource
win7-20240729-en
General
-
Target
Bender Logger V1.5 (still in beta).exe
-
Size
47KB
-
MD5
474f9807fa8bd9492fe2df927c22f8b8
-
SHA1
6c152c84e860d3e3fda3d42bd930eab9221d2960
-
SHA256
bd82518001b0e98e87bee5331d017872e5a2bafe549811d4953c145d5809e656
-
SHA512
a192c33482eb78552dac6e63d3a7888091a455b4c851fc3c6b6315ac4ffc1e14eb3de8e32784aa1d9ed23e324aff57e145b336e8627b4fd5dbd586246d312b7e
-
SSDEEP
768:quSgNT3ol7xWUpe+7mo2qLTrp5npecYgCPIXK5I0bIPrnnKshevEKwrDnsAs62tO:quSgNT3K52KjnpecrLXabqrnKtj2jxSM
Malware Config
Extracted
asyncrat
0.5.7B
Default
0.tcp.eu.ngrok.io:8080
0.tcp.eu.ngrok.io:13424
AsyncMutex_6SI8OkPnkasa
-
delay
3
-
install
true
-
install_file
win.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002345e-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Bender Logger V1.5 (still in beta).exe -
Executes dropped EXE 1 IoCs
pid Process 3828 win.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 172 0.tcp.eu.ngrok.io 124 0.tcp.eu.ngrok.io 142 0.tcp.eu.ngrok.io 147 0.tcp.eu.ngrok.io 153 0.tcp.eu.ngrok.io 162 0.tcp.eu.ngrok.io 87 0.tcp.eu.ngrok.io 93 0.tcp.eu.ngrok.io 96 0.tcp.eu.ngrok.io 114 0.tcp.eu.ngrok.io 116 0.tcp.eu.ngrok.io 167 0.tcp.eu.ngrok.io 158 0.tcp.eu.ngrok.io 24 0.tcp.eu.ngrok.io 62 0.tcp.eu.ngrok.io 102 0.tcp.eu.ngrok.io 132 0.tcp.eu.ngrok.io 136 0.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bender Logger V1.5 (still in beta).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1164 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe 2332 Bender Logger V1.5 (still in beta).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2332 Bender Logger V1.5 (still in beta).exe Token: SeDebugPrivilege 3828 win.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1668 2332 Bender Logger V1.5 (still in beta).exe 87 PID 2332 wrote to memory of 1668 2332 Bender Logger V1.5 (still in beta).exe 87 PID 2332 wrote to memory of 1668 2332 Bender Logger V1.5 (still in beta).exe 87 PID 2332 wrote to memory of 1656 2332 Bender Logger V1.5 (still in beta).exe 89 PID 2332 wrote to memory of 1656 2332 Bender Logger V1.5 (still in beta).exe 89 PID 2332 wrote to memory of 1656 2332 Bender Logger V1.5 (still in beta).exe 89 PID 1656 wrote to memory of 1164 1656 cmd.exe 91 PID 1656 wrote to memory of 1164 1656 cmd.exe 91 PID 1656 wrote to memory of 1164 1656 cmd.exe 91 PID 1668 wrote to memory of 856 1668 cmd.exe 92 PID 1668 wrote to memory of 856 1668 cmd.exe 92 PID 1668 wrote to memory of 856 1668 cmd.exe 92 PID 1656 wrote to memory of 3828 1656 cmd.exe 95 PID 1656 wrote to memory of 3828 1656 cmd.exe 95 PID 1656 wrote to memory of 3828 1656 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bender Logger V1.5 (still in beta).exe"C:\Users\Admin\AppData\Local\Temp\Bender Logger V1.5 (still in beta).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA613.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1164
-
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD55c95345dfff8bdaccb0d4659953d321d
SHA11e9dc1e90e03dde5046cf5ff592bc143792dca01
SHA256d7962321195b637a55742e932615f9142069847d4fa250019450af7dfbf97813
SHA512d2f7e17d0e89485560d18a987057219be843bba5131d7a5c6d61423fbccd828af3ae33175b9ac4661112de41f5b05b1658600cd0c9aef4b6af0e8501b272a51b
-
Filesize
47KB
MD5474f9807fa8bd9492fe2df927c22f8b8
SHA16c152c84e860d3e3fda3d42bd930eab9221d2960
SHA256bd82518001b0e98e87bee5331d017872e5a2bafe549811d4953c145d5809e656
SHA512a192c33482eb78552dac6e63d3a7888091a455b4c851fc3c6b6315ac4ffc1e14eb3de8e32784aa1d9ed23e324aff57e145b336e8627b4fd5dbd586246d312b7e