Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 18:17
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240708-en
General
-
Target
AsyncClient.exe
-
Size
59KB
-
MD5
7ffbcac612bf8f2c14d872af7e7c68a0
-
SHA1
46f7f128b782946f0ad74ed4a278a4c266e3ed5d
-
SHA256
5cd5530ea7aea507cb7faf6f9049448252aebd2cd4a4ecd7f040a1c44274dbaf
-
SHA512
4428df372dc50d285630883afec00fb375245ea52b36db976eadc513669d438e4eb398153e5f1317db8c92fd59cc418cafedc57db97b52b23190a11c0e4d71ad
-
SSDEEP
1536:8uk7VT0M912CVcPpD4zbkhc+eaT9VCbAHdMn25FyX/oah:8ukJT0ML2YcPizbk/998CK2P6/oah
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2020
oOcKCLkOWt6j
-
delay
3
-
install
true
-
install_file
Roblox.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0005000000010300-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2812 Roblox.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2752 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2640 AsyncClient.exe 2640 AsyncClient.exe 2640 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2640 AsyncClient.exe Token: SeDebugPrivilege 2812 Roblox.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2852 2640 AsyncClient.exe 30 PID 2640 wrote to memory of 2852 2640 AsyncClient.exe 30 PID 2640 wrote to memory of 2852 2640 AsyncClient.exe 30 PID 2640 wrote to memory of 2852 2640 AsyncClient.exe 30 PID 2640 wrote to memory of 2552 2640 AsyncClient.exe 32 PID 2640 wrote to memory of 2552 2640 AsyncClient.exe 32 PID 2640 wrote to memory of 2552 2640 AsyncClient.exe 32 PID 2640 wrote to memory of 2552 2640 AsyncClient.exe 32 PID 2852 wrote to memory of 2664 2852 cmd.exe 33 PID 2852 wrote to memory of 2664 2852 cmd.exe 33 PID 2852 wrote to memory of 2664 2852 cmd.exe 33 PID 2852 wrote to memory of 2664 2852 cmd.exe 33 PID 2552 wrote to memory of 2752 2552 cmd.exe 35 PID 2552 wrote to memory of 2752 2552 cmd.exe 35 PID 2552 wrote to memory of 2752 2552 cmd.exe 35 PID 2552 wrote to memory of 2752 2552 cmd.exe 35 PID 2552 wrote to memory of 2812 2552 cmd.exe 36 PID 2552 wrote to memory of 2812 2552 cmd.exe 36 PID 2552 wrote to memory of 2812 2552 cmd.exe 36 PID 2552 wrote to memory of 2812 2552 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Roblox" /tr '"C:\Users\Admin\AppData\Roaming\Roblox.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Roblox" /tr '"C:\Users\Admin\AppData\Roaming\Roblox.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2EAE.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\Roblox.exe"C:\Users\Admin\AppData\Roaming\Roblox.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5c3df659f07434cec42fe8ea258564ec7
SHA1f33d41a548a7b9dc0b0c76c4cadbcbf2e7d2e591
SHA25658b928792a81496976bb7a7584ad48d7c45ff4b7dc3ba3f05999dbdb42cb86f1
SHA512d6742be167a61c21115ff5996319720db78a1b3ab4d07b279d807673bc75f21b302e586c7946315d3274126528da3000020ab585423d58822470e8ba57e59057
-
Filesize
59KB
MD57ffbcac612bf8f2c14d872af7e7c68a0
SHA146f7f128b782946f0ad74ed4a278a4c266e3ed5d
SHA2565cd5530ea7aea507cb7faf6f9049448252aebd2cd4a4ecd7f040a1c44274dbaf
SHA5124428df372dc50d285630883afec00fb375245ea52b36db976eadc513669d438e4eb398153e5f1317db8c92fd59cc418cafedc57db97b52b23190a11c0e4d71ad