Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe
Resource
win7-20240903-en
General
-
Target
4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe
-
Size
32.0MB
-
MD5
fb962c2aac3ebcb22bfe895c456a0d61
-
SHA1
0d44b7262f2656c22479bd45b2b05ef0a1364ab8
-
SHA256
4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908
-
SHA512
e75c5ae61181dccc1fc375cbffea2b4375da19d04ba6895436bf51adbcb284d64654db9272320fe1c7b10fc561c696a0e9efc8b7020123b761567822196d1423
-
SSDEEP
393216:h5nOYndLMIiWP/65X1Rme/o1NROh2gA/hcxVQU:7doIi/3R3/iJgyc7F
Malware Config
Extracted
asyncrat
1.0.7
Default
imperiodosabor.shop:8821
wmplayer_Corporation
-
delay
1
-
install
false
-
install_file
wmplayer.exe
-
install_folder
%AppData%
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2736 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 5036 wmplayer.exe 3680 wmplayer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\Users\\Admin\\AppData\\Roaming\\wmplayer.exe" wmplayer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5036 set thread context of 3680 5036 wmplayer.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2736 powershell.exe 2736 powershell.exe 3244 powershell.exe 3068 powershell.exe 3244 powershell.exe 3068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 5036 wmplayer.exe Token: SeDebugPrivilege 5036 wmplayer.exe Token: SeDebugPrivilege 3680 wmplayer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 820 javaw.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2080 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 89 PID 3112 wrote to memory of 2080 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 89 PID 3112 wrote to memory of 2080 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 89 PID 2080 wrote to memory of 2736 2080 cmd.exe 91 PID 2080 wrote to memory of 2736 2080 cmd.exe 91 PID 2080 wrote to memory of 2736 2080 cmd.exe 91 PID 3112 wrote to memory of 4184 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 94 PID 3112 wrote to memory of 4184 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 94 PID 3112 wrote to memory of 4184 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 94 PID 3112 wrote to memory of 2592 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 95 PID 3112 wrote to memory of 2592 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 95 PID 3112 wrote to memory of 2592 3112 4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe 95 PID 2592 wrote to memory of 3068 2592 cmd.exe 99 PID 2592 wrote to memory of 3068 2592 cmd.exe 99 PID 2592 wrote to memory of 3068 2592 cmd.exe 99 PID 4184 wrote to memory of 3244 4184 cmd.exe 98 PID 4184 wrote to memory of 3244 4184 cmd.exe 98 PID 4184 wrote to memory of 3244 4184 cmd.exe 98 PID 3244 wrote to memory of 820 3244 powershell.exe 100 PID 3244 wrote to memory of 820 3244 powershell.exe 100 PID 3068 wrote to memory of 5036 3068 powershell.exe 101 PID 3068 wrote to memory of 5036 3068 powershell.exe 101 PID 3068 wrote to memory of 5036 3068 powershell.exe 101 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102 PID 5036 wrote to memory of 3680 5036 wmplayer.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe"C:\Users\Admin\AppData\Local\Temp\4acdc95e84a15b5af10b513c1629b3fac7f398c5c44f9445934ad0d7b81ac908.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Public\Java.jar2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Public\Java.jar3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Public\Java.jar"4⤵
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Public\wmplayer.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Public\wmplayer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Public\wmplayer.exe"C:\Users\Public\wmplayer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Public\wmplayer.exe"C:\Users\Public\wmplayer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
805B
MD558a9108e39c2ea50e65c23be3a9407cf
SHA1fb21f7b9330aa1a77080a3243b81b49035102d7b
SHA2566049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b
SHA51293804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf
-
Filesize
18KB
MD5833e8fb234eba9ab2b6097ac05fca0c1
SHA17c2de9b3eb1677b28df7d1be194549ec77c745fb
SHA256e17f96af6e74dba1df12753d2f56763c22f52f00c922409d57cb8b1df432cc18
SHA5122c183a531a4bf664abf6de39b30ec65f33791275b60b120caf01398dfc513a62921503b7056ba06ac02672631aa8192b87c17d0a3c516628a44d9cc85aee4687
-
Filesize
11KB
MD57773744a076c02e1dd2179ecb750a02d
SHA121ee6c592233d7518258bd2e40e4b6c9aed48564
SHA2566b76edcca73ad60d7dd38dc840787e398964598010d85b711ec3945b1ad15233
SHA512766fb75264d2a9c04fa769939acd7427a0bec1b4384bb51b80d672d209c809d561a88e9c97195c9eda1451f473ae463b3905d44fd5aadeadffb9980bf0d15038
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11.7MB
MD5140358d217ba48ecedca00e8b03c5abe
SHA1d6f089dc09ebf168b05809a404e65bf65f0920be
SHA256164236fceac19b8b5ebf842b94b99c263f3225dba28da7138f424b0d8e3aeb67
SHA512ea1e771edf89716d1424d791813f57b8fcee5544d401e450c98ba7866f86fb7876a64d83bc8b9d3bc51e4557420f92b415d01ec93e31668b60ae3705658845cd
-
Filesize
4.4MB
MD512acf1859f6fc1c824484be4b632dbee
SHA15b901f0d34364835d6ea4c473c313fad8854f448
SHA25625419a12766ebfd2eda94dd191ae105974c1e48347c2d96e2097e579e7af286b
SHA512d4ef083bc8b8b500e8503536767899d233e79d74c126d9ea2e51743fb3759101d7c0c503096c209f49406bdb082695b32634643372d928b72ed08116a85b9032