Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 14:11
Behavioral task
behavioral1
Sample
CustomCT.exe
Resource
win7-20240708-en
General
-
Target
CustomCT.exe
-
Size
47KB
-
MD5
577a559e5a5c96662301372fd8bacdc5
-
SHA1
b24c9dd5e5a268d9c3ae5f01499abe1b24999529
-
SHA256
21c633fa72ea32c1f8920b24c12a84cf456ef171b75da64febbffec5ccb606ee
-
SHA512
b3292f420a0de03ac593ff07bcf0b45d71035ca5c89380215c8c03dd7fc41e3bb603004e29239045a67b3d44bdd8194b627d0e94eeb2b4322db70474cf059be2
-
SSDEEP
768:ouea1TFBA3VWU1/fhcvmo2qjmI03lgtnwv7z7YPIM9G5d+KE0bFQyrqLAHXMwLQV:ouea1TFmq2cF47vd6G5d+MbFKAHcwLQV
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
2001:14ba:4850:e000::1a:6606
2001:14ba:4850:e000::1a:7707
2001:14ba:4850:e000::1a:8808
192.168.1.110:6606
192.168.1.110:7707
192.168.1.110:8808
192.168.1.1:6606
192.168.1.1:7707
192.168.1.1:8808
Eo6yZUg4OeDL
-
delay
3
-
install
true
-
install_file
CheatEngineCustom.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000004ed7-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2768 CheatEngineCustom.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatEngineCustom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CustomCT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1508 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2172 CustomCT.exe 2172 CustomCT.exe 2172 CustomCT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2172 CustomCT.exe Token: SeDebugPrivilege 2768 CheatEngineCustom.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2720 2172 CustomCT.exe 31 PID 2172 wrote to memory of 2720 2172 CustomCT.exe 31 PID 2172 wrote to memory of 2720 2172 CustomCT.exe 31 PID 2172 wrote to memory of 2720 2172 CustomCT.exe 31 PID 2172 wrote to memory of 3012 2172 CustomCT.exe 33 PID 2172 wrote to memory of 3012 2172 CustomCT.exe 33 PID 2172 wrote to memory of 3012 2172 CustomCT.exe 33 PID 2172 wrote to memory of 3012 2172 CustomCT.exe 33 PID 2720 wrote to memory of 2732 2720 cmd.exe 35 PID 2720 wrote to memory of 2732 2720 cmd.exe 35 PID 2720 wrote to memory of 2732 2720 cmd.exe 35 PID 2720 wrote to memory of 2732 2720 cmd.exe 35 PID 3012 wrote to memory of 1508 3012 cmd.exe 36 PID 3012 wrote to memory of 1508 3012 cmd.exe 36 PID 3012 wrote to memory of 1508 3012 cmd.exe 36 PID 3012 wrote to memory of 1508 3012 cmd.exe 36 PID 3012 wrote to memory of 2768 3012 cmd.exe 37 PID 3012 wrote to memory of 2768 3012 cmd.exe 37 PID 3012 wrote to memory of 2768 3012 cmd.exe 37 PID 3012 wrote to memory of 2768 3012 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\CustomCT.exe"C:\Users\Admin\AppData\Local\Temp\CustomCT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "CheatEngineCustom" /tr '"C:\Users\Admin\AppData\Roaming\CheatEngineCustom.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "CheatEngineCustom" /tr '"C:\Users\Admin\AppData\Roaming\CheatEngineCustom.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF0B5.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\CheatEngineCustom.exe"C:\Users\Admin\AppData\Roaming\CheatEngineCustom.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161B
MD5f858e1cbea156e438b61ede7cd60f4b1
SHA1a76d05a5da22ee93a65fb4059b14974ad03b8e8a
SHA25659c5a9d77ceeb516c88a41604d3c0f0c82d35be378b1c682df8d5d1a7d3850fb
SHA51211580492f797eab69f5c5e0d2f866e0fdc84d402a9820b1f6d457b14b4dbd2c47bb36513eea4dff85074886dbcf57cf4fd038d222784bf7ee5e62059a8c39aa8
-
Filesize
47KB
MD5577a559e5a5c96662301372fd8bacdc5
SHA1b24c9dd5e5a268d9c3ae5f01499abe1b24999529
SHA25621c633fa72ea32c1f8920b24c12a84cf456ef171b75da64febbffec5ccb606ee
SHA512b3292f420a0de03ac593ff07bcf0b45d71035ca5c89380215c8c03dd7fc41e3bb603004e29239045a67b3d44bdd8194b627d0e94eeb2b4322db70474cf059be2