Analysis
-
max time kernel
1196s -
max time network
1170s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-08-2024 14:26
General
-
Target
kkkk.exe
-
Size
47KB
-
MD5
1d7a26fbb453cc6d2e7d043b78e35a20
-
SHA1
09f126416801d34bbb810f31177d85af47d7e6e3
-
SHA256
828ba73d572808c7a5b1446c74aac88f12783993c77ced5f448a4d013d5af5ba
-
SHA512
a5c7406b72a12c0e1fba41ab7860298c32c46316c614b7f6362006fa592ca014753211fee1075436080cb1ed08eaef43aefbb6e3d982827e4eed00f8954987ea
-
SSDEEP
768:Juk0VT3ongoWU2Gjimo2qrZwC9VsFtePIpk6Z/0bCwAL48IESVGmitVzcWIVgCt1:Juk0VT3Q+2GVsFtpkOcbCwAIVjitVzcp
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:7707
127.0.0.1:8808
O0LOqrCJA4pL
-
delay
3
-
install
true
-
install_file
hey.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000600000002aa1d-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3100 hey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3596 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe 2872 kkkk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2872 kkkk.exe Token: SeDebugPrivilege 3100 hey.exe Token: SeDebugPrivilege 3100 hey.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2872 wrote to memory of 232 2872 kkkk.exe 78 PID 2872 wrote to memory of 232 2872 kkkk.exe 78 PID 2872 wrote to memory of 232 2872 kkkk.exe 78 PID 2872 wrote to memory of 3532 2872 kkkk.exe 80 PID 2872 wrote to memory of 3532 2872 kkkk.exe 80 PID 2872 wrote to memory of 3532 2872 kkkk.exe 80 PID 3532 wrote to memory of 3596 3532 cmd.exe 82 PID 3532 wrote to memory of 3596 3532 cmd.exe 82 PID 3532 wrote to memory of 3596 3532 cmd.exe 82 PID 232 wrote to memory of 3284 232 cmd.exe 83 PID 232 wrote to memory of 3284 232 cmd.exe 83 PID 232 wrote to memory of 3284 232 cmd.exe 83 PID 3532 wrote to memory of 3100 3532 cmd.exe 84 PID 3532 wrote to memory of 3100 3532 cmd.exe 84 PID 3532 wrote to memory of 3100 3532 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\kkkk.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "hey" /tr '"C:\Users\Admin\AppData\Roaming\hey.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "hey" /tr '"C:\Users\Admin\AppData\Roaming\hey.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAE12.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3596
-
-
C:\Users\Admin\AppData\Roaming\hey.exe"C:\Users\Admin\AppData\Roaming\hey.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD50c35c5dbc8b3f9a3c5923e4db8e71aad
SHA1247767c533c3f564e6e724d479bf7e2599c432e2
SHA25690410e5f46fe71651ba23e5f80990994ae5413dd7c8f1c234c61e87e8b4263b5
SHA512223205039498e5542c1b531c228b30f2146c6b2ee613b6c7beae94cd52d5de68aca738c09fc2b1e64e58e660a6c66c7dd57e14af5b6d499595b9065c6cbb6500
-
Filesize
47KB
MD51d7a26fbb453cc6d2e7d043b78e35a20
SHA109f126416801d34bbb810f31177d85af47d7e6e3
SHA256828ba73d572808c7a5b1446c74aac88f12783993c77ced5f448a4d013d5af5ba
SHA512a5c7406b72a12c0e1fba41ab7860298c32c46316c614b7f6362006fa592ca014753211fee1075436080cb1ed08eaef43aefbb6e3d982827e4eed00f8954987ea