Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 14:47
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240705-en
General
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
c792e7efbdb2d57c605efcb45a48109d
-
SHA1
eb0c663a68aee213c6b64e1f10207409f0da5b20
-
SHA256
e544ff3ed62db97c02442c849b3214a7b3d913fb73b430d79edf557e7ec91555
-
SHA512
f407285fd965f6d7e5ea42312fda6159cd9546480e2752983cf6f784c414ee040446c6bbb595d27e9d27d07e5f59355265fe7384f6666af86c3c6a8e1aa74b33
-
SSDEEP
768:Juk0VT3ongoWU2Gjimo2qryBmv83OxmIsPIjACXD9izQ0b3eQbC2l6S6heyV27H1:Juk0VT3Q+2qg0jAgCb3ZbC2lqYyV27hv
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:7707
127.0.0.1:8808
uSyaMxhmF1LU
-
delay
3
-
install
true
-
install_file
hey.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015dab-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2752 hey.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3048 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1220 AsyncClient.exe 1220 AsyncClient.exe 1220 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1220 AsyncClient.exe Token: SeDebugPrivilege 2752 hey.exe Token: SeDebugPrivilege 2752 hey.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2464 1220 AsyncClient.exe 31 PID 1220 wrote to memory of 2464 1220 AsyncClient.exe 31 PID 1220 wrote to memory of 2464 1220 AsyncClient.exe 31 PID 1220 wrote to memory of 2464 1220 AsyncClient.exe 31 PID 1220 wrote to memory of 2792 1220 AsyncClient.exe 33 PID 1220 wrote to memory of 2792 1220 AsyncClient.exe 33 PID 1220 wrote to memory of 2792 1220 AsyncClient.exe 33 PID 1220 wrote to memory of 2792 1220 AsyncClient.exe 33 PID 2464 wrote to memory of 2648 2464 cmd.exe 35 PID 2464 wrote to memory of 2648 2464 cmd.exe 35 PID 2464 wrote to memory of 2648 2464 cmd.exe 35 PID 2464 wrote to memory of 2648 2464 cmd.exe 35 PID 2792 wrote to memory of 3048 2792 cmd.exe 36 PID 2792 wrote to memory of 3048 2792 cmd.exe 36 PID 2792 wrote to memory of 3048 2792 cmd.exe 36 PID 2792 wrote to memory of 3048 2792 cmd.exe 36 PID 2792 wrote to memory of 2752 2792 cmd.exe 37 PID 2792 wrote to memory of 2752 2792 cmd.exe 37 PID 2792 wrote to memory of 2752 2792 cmd.exe 37 PID 2792 wrote to memory of 2752 2792 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "hey" /tr '"C:\Users\Admin\AppData\Roaming\hey.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "hey" /tr '"C:\Users\Admin\AppData\Roaming\hey.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE4B4.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3048
-
-
C:\Users\Admin\AppData\Roaming\hey.exe"C:\Users\Admin\AppData\Roaming\hey.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD513af548e51d291a9cf826d5f2c0eecde
SHA177670077a90a1b06dd6272ff7be3df0adda960bf
SHA256a2a302741ec53819afc9b16d2c41d65241d8c116283caf43c2c0571607ae216a
SHA512a21205f333796d0ec6b0f0c984854b0bfe1e32f1a63e80a1388b8637844ca9f9a732c526f46264f30b42cf44bc8f0f56bd35082a8fe57e681855d7e2130fa78d
-
Filesize
47KB
MD5c792e7efbdb2d57c605efcb45a48109d
SHA1eb0c663a68aee213c6b64e1f10207409f0da5b20
SHA256e544ff3ed62db97c02442c849b3214a7b3d913fb73b430d79edf557e7ec91555
SHA512f407285fd965f6d7e5ea42312fda6159cd9546480e2752983cf6f784c414ee040446c6bbb595d27e9d27d07e5f59355265fe7384f6666af86c3c6a8e1aa74b33