Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 14:49
Behavioral task
behavioral1
Sample
ficheiro.exe
Resource
win7-20240704-en
General
-
Target
ficheiro.exe
-
Size
66KB
-
MD5
5f2804848c03af062230d595f5e3f64f
-
SHA1
078a1658a8f4b420b657e712939d8f0ecf63540b
-
SHA256
05fd9a9a3e64771d103a4af295262aabaed466d049d0abdff5850689062c1daa
-
SHA512
565209416d326b2fa8fdc094ba2f718bdfcf92c9d85495e2d2f1a6411339dd2f834f87a2f27cbb8a80f66de701aa622749d64a6cb14033ee9b0e637033bf5349
-
SSDEEP
1536:8mfW6qHdykrVMKuJUYFsbWdry9d8UX6kIbnBkA1vD7XtrQTGex:8me6qHdykGKuJUYFsady9yUXubnH1vnO
Malware Config
Extracted
asyncrat
AWS | 3Losh
4iba
hema2024.from-ut.com:6666
hema2024.from-ut.com:555
hema2024.from-ut.com:5555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ficheiro.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 ficheiro.exe 4812 ficheiro.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 ficheiro.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4812 ficheiro.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ficheiro.exe"C:\Users\Admin\AppData\Local\Temp\ficheiro.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:81⤵PID:4064