Analysis
-
max time kernel
1796s -
max time network
1153s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/10/2024, 20:41
Behavioral task
behavioral1
Sample
HomeBrewX_SS.exe
Resource
win10v2004-20240802-en
General
-
Target
HomeBrewX_SS.exe
-
Size
47KB
-
MD5
e97b4205f7629c6b7bef802c80262e0c
-
SHA1
7ced92ce3417bf5f48cf420c7084818c4bd95efb
-
SHA256
809112ac6e017b61aebf42258329beca47731c9863fba713d1c8e8f9427426a7
-
SHA512
e220a9ee2821287beaa145bcdce226c72d2cf94e4ff1f366879688b12bf13b31f74289834678efa8e7d2995fd0e38ea808e977d6e1416f3b1ebfddd0e87908f5
-
SSDEEP
768:KuACNTHkvSbWUnwKJmo2q7jnknTL4yPIRSfcwL/p0bgMjY5akItMfe4JxEENEzlS:KuACNTHge24CL4bRSEwL2bgEJkI8vEEx
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
HomeBrewX_ServerSide.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002aade-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3128 HomeBrewX_ServerSide.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HomeBrewX_SS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HomeBrewX_ServerSide.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4300 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe 2756 HomeBrewX_SS.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2756 HomeBrewX_SS.exe Token: SeDebugPrivilege 3128 HomeBrewX_ServerSide.exe Token: SeDebugPrivilege 3128 HomeBrewX_ServerSide.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2756 wrote to memory of 3872 2756 HomeBrewX_SS.exe 78 PID 2756 wrote to memory of 3872 2756 HomeBrewX_SS.exe 78 PID 2756 wrote to memory of 3872 2756 HomeBrewX_SS.exe 78 PID 2756 wrote to memory of 652 2756 HomeBrewX_SS.exe 80 PID 2756 wrote to memory of 652 2756 HomeBrewX_SS.exe 80 PID 2756 wrote to memory of 652 2756 HomeBrewX_SS.exe 80 PID 652 wrote to memory of 4300 652 cmd.exe 82 PID 652 wrote to memory of 4300 652 cmd.exe 82 PID 652 wrote to memory of 4300 652 cmd.exe 82 PID 3872 wrote to memory of 1696 3872 cmd.exe 83 PID 3872 wrote to memory of 1696 3872 cmd.exe 83 PID 3872 wrote to memory of 1696 3872 cmd.exe 83 PID 652 wrote to memory of 3128 652 cmd.exe 84 PID 652 wrote to memory of 3128 652 cmd.exe 84 PID 652 wrote to memory of 3128 652 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\HomeBrewX_SS.exe"C:\Users\Admin\AppData\Local\Temp\HomeBrewX_SS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "HomeBrewX_ServerSide" /tr '"C:\Users\Admin\AppData\Roaming\HomeBrewX_ServerSide.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "HomeBrewX_ServerSide" /tr '"C:\Users\Admin\AppData\Roaming\HomeBrewX_ServerSide.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAF0C.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4300
-
-
C:\Users\Admin\AppData\Roaming\HomeBrewX_ServerSide.exe"C:\Users\Admin\AppData\Roaming\HomeBrewX_ServerSide.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD512f01c3409fca1bb6bc639af7c5b7380
SHA1676668eae4dede389c339d868349888e36208ae6
SHA2565933d16669b001315785437535ab39fa1153f70123ee766bcbeb338260a082f9
SHA512c85939790e8a3f297ae99cfdb30def06021d27acf7212459be27f525e1941b99f582332a61d66dede78f179ba54c556f116481864451215872fe96665303d6e7
-
Filesize
47KB
MD5e97b4205f7629c6b7bef802c80262e0c
SHA17ced92ce3417bf5f48cf420c7084818c4bd95efb
SHA256809112ac6e017b61aebf42258329beca47731c9863fba713d1c8e8f9427426a7
SHA512e220a9ee2821287beaa145bcdce226c72d2cf94e4ff1f366879688b12bf13b31f74289834678efa8e7d2995fd0e38ea808e977d6e1416f3b1ebfddd0e87908f5