Analysis
-
max time kernel
21s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 23:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Fructose Checker.exe
Resource
win7-20240729-en
General
-
Target
Fructose Checker.exe
-
Size
9.7MB
-
MD5
c9f3e6d590c86065a93b9a93efab2363
-
SHA1
035c94447fb233dc962bb9a578b2a01b9a312e8e
-
SHA256
49e31f8fbab7da57b575da0fcab3cc4f412c922c4af95416e68134de3d743844
-
SHA512
a3a951fa341b8fda94fea428ace54b119966c1243b3e6ac419323e8bb17aa1251944d4a8d6783ffd15bf4cf246dd57e00afaa49311f73d655b0ad6b63224327d
-
SSDEEP
196608:FtW1v4s39/4BsNYFRetQ+Ym9nLIUMBuiyObFrEUndTfyHdy2Cao7/NEeLurDRc:FmAsN/4GNY4QgLIZyMFVdfyMLJ7BLcDC
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
googl3d.ddnsking.com:8808
googl3d.ddnsking.com:8080
googl3d.ddnsking.com:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Runtime.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00030000000230ad-18.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Fructose Checker.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Runtime.exe -
Executes dropped EXE 3 IoCs
pid Process 1740 Fructose Check.exe 1752 Runtime.exe 3624 Runtime.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 388 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 1752 Runtime.exe 3624 Runtime.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1752 Runtime.exe Token: SeDebugPrivilege 3624 Runtime.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3624 Runtime.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3596 wrote to memory of 1740 3596 Fructose Checker.exe 89 PID 3596 wrote to memory of 1740 3596 Fructose Checker.exe 89 PID 3596 wrote to memory of 1752 3596 Fructose Checker.exe 91 PID 3596 wrote to memory of 1752 3596 Fructose Checker.exe 91 PID 3596 wrote to memory of 1752 3596 Fructose Checker.exe 91 PID 1752 wrote to memory of 4000 1752 Runtime.exe 95 PID 1752 wrote to memory of 4000 1752 Runtime.exe 95 PID 1752 wrote to memory of 4000 1752 Runtime.exe 95 PID 1752 wrote to memory of 2076 1752 Runtime.exe 97 PID 1752 wrote to memory of 2076 1752 Runtime.exe 97 PID 1752 wrote to memory of 2076 1752 Runtime.exe 97 PID 2076 wrote to memory of 388 2076 cmd.exe 99 PID 2076 wrote to memory of 388 2076 cmd.exe 99 PID 2076 wrote to memory of 388 2076 cmd.exe 99 PID 4000 wrote to memory of 1392 4000 cmd.exe 100 PID 4000 wrote to memory of 1392 4000 cmd.exe 100 PID 4000 wrote to memory of 1392 4000 cmd.exe 100 PID 2076 wrote to memory of 3624 2076 cmd.exe 104 PID 2076 wrote to memory of 3624 2076 cmd.exe 104 PID 2076 wrote to memory of 3624 2076 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fructose Checker.exe"C:\Users\Admin\AppData\Local\Temp\Fructose Checker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Fructose Check.exe"C:\Users\Admin\AppData\Local\Temp\Fructose Check.exe"2⤵
- Executes dropped EXE
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Runtime.exe"C:\Users\Admin\AppData\Local\Temp\Runtime.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Runtime" /tr '"C:\Users\Admin\AppData\Roaming\Runtime.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE07D.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:388
-
-
C:\Users\Admin\AppData\Roaming\Runtime.exe"C:\Users\Admin\AppData\Roaming\Runtime.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=007D71BDC9D267643C076563C8696612; domain=.bing.com; expires=Thu, 11-Sep-2025 23:16:32 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0F62825BAC3E448184F87B9BD88F40F0 Ref B: LON04EDGE0920 Ref C: 2024-08-17T23:16:32Z
date: Sat, 17 Aug 2024 23:16:32 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=007D71BDC9D267643C076563C8696612
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=IWKhPy4o6Nmh1tJcDnjpRaKdZk1p4jLOemgjErV1VXo; domain=.bing.com; expires=Thu, 11-Sep-2025 23:16:32 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1E60AD74D42D4784AEAA81FF46158332 Ref B: LON04EDGE0920 Ref C: 2024-08-17T23:16:32Z
date: Sat, 17 Aug 2024 23:16:32 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=007D71BDC9D267643C076563C8696612; MSPTC=IWKhPy4o6Nmh1tJcDnjpRaKdZk1p4jLOemgjErV1VXo
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1566545793E8418C8002442DB3CA8239 Ref B: LON04EDGE0920 Ref C: 2024-08-17T23:16:32Z
date: Sat, 17 Aug 2024 23:16:32 GMT
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestgoogl3d.ddnsking.comIN AResponse
-
Remote address:8.8.8.8:53Requestgoogl3d.ddnsking.comIN A
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=tls, http22.0kB 9.3kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=703d26f40c7b47baa6f0f5e34e7feeba&localId=w:F595C12A-38F0-79CD-7666-DE379BE74C7C&deviceId=6966569430194623&anid=HTTP Response
204
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
140 B 133 B 2 1
DNS Request
81.144.22.2.in-addr.arpa
DNS Request
81.144.22.2.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
66 B 123 B 1 1
DNS Request
googl3d.ddnsking.com
-
66 B 1
DNS Request
googl3d.ddnsking.com
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5acc9090417037dfa2a55b46ed86e32b8
SHA153fa6fb25fb3e88c24d2027aca6ae492b2800a4d
SHA2562412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b
SHA512d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b
-
Filesize
22.4MB
MD51d00ccd2db1741957e59c130987c9a86
SHA111e8f9a13f84bdf5b9039a4b74835209ed4ad46e
SHA256c08a5d04b4a42324a1d3bf8308f65f9dbb893a09f5f82134753dfb1cc307834f
SHA5122ce4589ff25a17c8efd2026f4d0ba85beed3f8d75732c9c7a9113e3ff1d3fe158f3d280e1f6bce6bd93a02520d6abde2a2c67a648195006a8168ff998041e135
-
Filesize
66KB
MD50433c7ab3456438e9f6ef3a02a78af76
SHA1d179cd62d961db78f88d048bf7ced9c6dc46782a
SHA25606b7a3e877810de0c28466b68e81066bb76b22db9541be32864c1dae5873f0b0
SHA512214a7641d8a929f5a7bdbe47ad46fe4674e34d5f5fbf44c156f472aca4e1b091e447a18c4891f1289a0f08f2e3e3c1b85c990f412a42d0d8f5f331d300338cbc
-
Filesize
151B
MD5f8de202b18998b5b05d2a963963dac39
SHA16890780eab88b63574f4f36da0464facd684806a
SHA256dccce237153e715b85262722e0e76efba3b4c90b4ceecdfde50179f349560864
SHA512f18968e8afaa24549a7b75b13f39f83669b570eb863ae40ed4091be25f7535c4bb93c633d2ab8ab50c83af9d9a197763078f04aa6c558b0943d0910243ed5c4e