Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 23:32
Behavioral task
behavioral1
Sample
bgfbgbf.exe
Resource
win7-20240705-en
General
-
Target
bgfbgbf.exe
-
Size
47KB
-
MD5
7c6639fdafe9ded30bfc4bc6fdf2484b
-
SHA1
51afcbb510f4db29c3da8db614a41abc220be493
-
SHA256
dc8fa18a06c6a264d5d9f6a820857b8017183ffbc60de3fcdea52d4ea56b7881
-
SHA512
874ca5d93854c0e938297878e4d44b965c4a97bb223246a112ee8826b6a2c3bb32c040f63ffd4c28217f68c57abab1feb037ac1168652b4244189b35f93120b4
-
SSDEEP
768:4uPfZTg4pYiWUU9jjmo2qrM5G3x8SJgorPISUld0bflPbm71+FT+f6SBGUc0kYBv:4uPfZTgKa2jexHSoUSUIbflDtFCNbhd1
Malware Config
Extracted
asyncrat
0.5.8
Default
since-searching.gl.at.ply.gg:64197
Xc60tiWQ5q7F
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgfbgbf.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2816 bgfbgbf.exe Token: SeDebugPrivilege 2816 bgfbgbf.exe Token: SeDebugPrivilege 3100 taskmgr.exe Token: SeSystemProfilePrivilege 3100 taskmgr.exe Token: SeCreateGlobalPrivilege 3100 taskmgr.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe 3100 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bgfbgbf.exe"C:\Users\Admin\AppData\Local\Temp\bgfbgbf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3100