Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
22a3ab6e642e474d953b412f0ddf58d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
22a3ab6e642e474d953b412f0ddf58d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
22a3ab6e642e474d953b412f0ddf58d0N.exe
-
Size
268KB
-
MD5
22a3ab6e642e474d953b412f0ddf58d0
-
SHA1
de6ac1aa488e973c36f23290e2399cfcca17ff85
-
SHA256
d43d1942c7ce8818ced3b67e0b080de71737bbe77f39011f1baecf54cb9c8e82
-
SHA512
c9b292f5ae7809d18407fb95cc684d595eb3a28b091245adb43b4a4640684a79ff462f628add8484dc4f12e03d10ef8243daf456e4157ed8eb6f797cd349fb49
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/i:WFzDqa86hV6uRRqX1evPlwAq
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4988-29-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 22a3ab6e642e474d953b412f0ddf58d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4404 HiPatchService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" 22a3ab6e642e474d953b412f0ddf58d0N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4404 set thread context of 4988 4404 HiPatchService.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22a3ab6e642e474d953b412f0ddf58d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiPatchService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegAsm.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3620 timeout.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe 4988 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4404 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 94 PID 4500 wrote to memory of 4404 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 94 PID 4500 wrote to memory of 4404 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 94 PID 4500 wrote to memory of 1064 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 95 PID 4500 wrote to memory of 1064 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 95 PID 4500 wrote to memory of 1064 4500 22a3ab6e642e474d953b412f0ddf58d0N.exe 95 PID 1064 wrote to memory of 3620 1064 cmd.exe 97 PID 1064 wrote to memory of 3620 1064 cmd.exe 97 PID 1064 wrote to memory of 3620 1064 cmd.exe 97 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98 PID 4404 wrote to memory of 4988 4404 HiPatchService.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\22a3ab6e642e474d953b412f0ddf58d0N.exe"C:\Users\Admin\AppData\Local\Temp\22a3ab6e642e474d953b412f0ddf58d0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1803⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3620
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
268KB
MD5ac66ad3a04e2909ab01b17ba6954192f
SHA11050b91c005cd79b4119c7278d07a339bc3e0ef0
SHA256ec68fac1b1bc3abd9750845849e524d21bcff39ee09166cd75298bb1000b68d4
SHA512c02a8eb1b2e1eb399edc3e9a61426924ae454adcfe4d83814939124fe2a21e5a222d952b30ce9db7efd70eded80115338de12fc78a5d0845ce4d2a912c323d98