Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 20:57
Behavioral task
behavioral1
Sample
bootstrap.exe
Resource
win7-20240705-en
General
-
Target
bootstrap.exe
-
Size
45KB
-
MD5
25ab471d602be90115bdd6841ecbc7ab
-
SHA1
ac8cabe33a562d931d8829a363cc0b719885177a
-
SHA256
2ba22889419f774476c31aa575e720606e9aa1c826992932a66cefacfb909af2
-
SHA512
ddd9603f8c7a53b2056b9cbd4630a9e63db8768d7480d701ab0eb5f98289e7116b4cdfc05c073610f2d7bea1e9a79f10e11aa083437f1ad6bdbe048efbf04d11
-
SSDEEP
768:BuQSNTvEEaBrWUXFd5mo2qmi8KjPGaG6PIyzjbFgX3iV6lNwYoCXBDZ3x:BuQSNT8572xvKTkDy3bCXSElNwqd3x
Malware Config
Extracted
asyncrat
0.5.8
Default
baltekbezmajtek.zapto.org:6606
baltekbezmajtek.zapto.org:7707
baltekbezmajtek.zapto.org:8808
vBItBvMTrx8n
-
delay
3
-
install
true
-
install_file
cached_files.exe
-
install_folder
%AppData%
Extracted
latentbot
baltekbezmajtek.zapto.org
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002335b-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bootstrap.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 cached_files.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cached_files.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bootstrap.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1096 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe 4220 bootstrap.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4220 bootstrap.exe Token: SeDebugPrivilege 2796 cached_files.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3916 4220 bootstrap.exe 92 PID 4220 wrote to memory of 3916 4220 bootstrap.exe 92 PID 4220 wrote to memory of 3916 4220 bootstrap.exe 92 PID 4220 wrote to memory of 2956 4220 bootstrap.exe 94 PID 4220 wrote to memory of 2956 4220 bootstrap.exe 94 PID 4220 wrote to memory of 2956 4220 bootstrap.exe 94 PID 3916 wrote to memory of 1804 3916 cmd.exe 96 PID 3916 wrote to memory of 1804 3916 cmd.exe 96 PID 3916 wrote to memory of 1804 3916 cmd.exe 96 PID 2956 wrote to memory of 1096 2956 cmd.exe 97 PID 2956 wrote to memory of 1096 2956 cmd.exe 97 PID 2956 wrote to memory of 1096 2956 cmd.exe 97 PID 2956 wrote to memory of 2796 2956 cmd.exe 100 PID 2956 wrote to memory of 2796 2956 cmd.exe 100 PID 2956 wrote to memory of 2796 2956 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\bootstrap.exe"C:\Users\Admin\AppData\Local\Temp\bootstrap.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "cached_files" /tr '"C:\Users\Admin\AppData\Roaming\cached_files.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "cached_files" /tr '"C:\Users\Admin\AppData\Roaming\cached_files.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp80D8.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1096
-
-
C:\Users\Admin\AppData\Roaming\cached_files.exe"C:\Users\Admin\AppData\Roaming\cached_files.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD510cba6f01a78d5cbf14db433d9697b7f
SHA1e328dbe4230e7397d97c12c84edd8e6bd1558c71
SHA256e924cbc0d7d1aaec1cabf589a37a7d84a07fca3a13cf8c8de02720eb6ec76a40
SHA512cee38dcf0737263a7eb7d91792ebdbc3dc652a6c445d4906bbdec6172efb90563dbcf3d03f8e67fa9e68b4727cfbf057b3d5780f993a6c7f1f671e9afff4439a
-
Filesize
45KB
MD525ab471d602be90115bdd6841ecbc7ab
SHA1ac8cabe33a562d931d8829a363cc0b719885177a
SHA2562ba22889419f774476c31aa575e720606e9aa1c826992932a66cefacfb909af2
SHA512ddd9603f8c7a53b2056b9cbd4630a9e63db8768d7480d701ab0eb5f98289e7116b4cdfc05c073610f2d7bea1e9a79f10e11aa083437f1ad6bdbe048efbf04d11