Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 01:10
Behavioral task
behavioral1
Sample
9c2d4871014553f542534fce03805000N.exe
Resource
win7-20240729-en
General
-
Target
9c2d4871014553f542534fce03805000N.exe
-
Size
63KB
-
MD5
9c2d4871014553f542534fce03805000
-
SHA1
cd44e0ee979718203d896fcc7dcb5cc5077eb721
-
SHA256
9fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
-
SHA512
7d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442
-
SSDEEP
768:PHDvlKazXYN78NwC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXOlKYsN3tlSusV:btTXA9dSJYUbdh9OlAF+usdpqKmY7
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/zs3YKzJ3
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001224f-16.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2976 Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2788 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2312 9c2d4871014553f542534fce03805000N.exe 2312 9c2d4871014553f542534fce03805000N.exe 2312 9c2d4871014553f542534fce03805000N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2312 9c2d4871014553f542534fce03805000N.exe Token: SeDebugPrivilege 2976 Discord.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2244 2312 9c2d4871014553f542534fce03805000N.exe 31 PID 2312 wrote to memory of 2244 2312 9c2d4871014553f542534fce03805000N.exe 31 PID 2312 wrote to memory of 2244 2312 9c2d4871014553f542534fce03805000N.exe 31 PID 2312 wrote to memory of 2004 2312 9c2d4871014553f542534fce03805000N.exe 33 PID 2312 wrote to memory of 2004 2312 9c2d4871014553f542534fce03805000N.exe 33 PID 2312 wrote to memory of 2004 2312 9c2d4871014553f542534fce03805000N.exe 33 PID 2244 wrote to memory of 2784 2244 cmd.exe 35 PID 2244 wrote to memory of 2784 2244 cmd.exe 35 PID 2244 wrote to memory of 2784 2244 cmd.exe 35 PID 2004 wrote to memory of 2788 2004 cmd.exe 36 PID 2004 wrote to memory of 2788 2004 cmd.exe 36 PID 2004 wrote to memory of 2788 2004 cmd.exe 36 PID 2004 wrote to memory of 2976 2004 cmd.exe 37 PID 2004 wrote to memory of 2976 2004 cmd.exe 37 PID 2004 wrote to memory of 2976 2004 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2d4871014553f542534fce03805000N.exe"C:\Users\Admin\AppData\Local\Temp\9c2d4871014553f542534fce03805000N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp464.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2788
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5143c2a94403be3225a8da733d2ae3e95
SHA1c93862db7f3ea54ea90091c6b2934bb372829bed
SHA256edcf4d5ec6aaf698692963d447926939730b45fdf79ca22c4d22eb14532b2e99
SHA512b0fd2a5dc4f7b17cb33ef587144cd157135087d904a91457e8567feea0a4af68631bf4089f4fbc4ad0921ae2d83ec022548b5e0564a46fb9c10474997698a4f2
-
Filesize
63KB
MD59c2d4871014553f542534fce03805000
SHA1cd44e0ee979718203d896fcc7dcb5cc5077eb721
SHA2569fde4361d7beadb8c11afed5b0518211740cef76ea03146e98a8337581e02f7e
SHA5127d15b22083a0132440297035e5854b318e2aadc615c7959285bc8516292b19f7cd1b062350bde02397e562952ec0910100c4988bec2d92b4ca394b76b1bb7442