Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 09:07
Behavioral task
behavioral1
Sample
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe
Resource
win7-20240903-en
General
-
Target
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe
-
Size
63KB
-
MD5
d1dcb18f3781186a95bf7f9c084ae511
-
SHA1
140678a6122aea97d305499a806448098851dbbd
-
SHA256
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4
-
SHA512
e17810dbff395e79295cbef9c1d66000475302305386416651b08152b74f188ca39cac3f7715b2a0a34963c075716521553115ecdcd42c3bd52d56365feafb72
-
SSDEEP
1536:y62ZBFzTkF7YUbrh9d58mMEugdpqKmY7:y62FzgJYUbrqyGz
Malware Config
Extracted
asyncrat
Default
production-loading.gl.at.ply.gg:48573
-
delay
1
-
install
true
-
install_file
svcohost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\svcohost.exe family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe -
Executes dropped EXE 1 IoCs
Processes:
svcohost.exepid process 4948 svcohost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1864 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exepid process 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exesvcohost.exedescription pid process Token: SeDebugPrivilege 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe Token: SeDebugPrivilege 4948 svcohost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.execmd.execmd.exedescription pid process target process PID 3900 wrote to memory of 1356 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe cmd.exe PID 3900 wrote to memory of 1356 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe cmd.exe PID 3900 wrote to memory of 3384 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe cmd.exe PID 3900 wrote to memory of 3384 3900 73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe cmd.exe PID 1356 wrote to memory of 3872 1356 cmd.exe schtasks.exe PID 1356 wrote to memory of 3872 1356 cmd.exe schtasks.exe PID 3384 wrote to memory of 1864 3384 cmd.exe timeout.exe PID 3384 wrote to memory of 1864 3384 cmd.exe timeout.exe PID 3384 wrote to memory of 4948 3384 cmd.exe svcohost.exe PID 3384 wrote to memory of 4948 3384 cmd.exe svcohost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe"C:\Users\Admin\AppData\Local\Temp\73732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svcohost" /tr '"C:\Users\Admin\AppData\Roaming\svcohost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svcohost" /tr '"C:\Users\Admin\AppData\Roaming\svcohost.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp974E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1864 -
C:\Users\Admin\AppData\Roaming\svcohost.exe"C:\Users\Admin\AppData\Roaming\svcohost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d46a1e9f3117b56dc51b3b8196a77f15
SHA1222b60085d7890d2abf384c666542591dc63a968
SHA256fbfbab543a4f247a6fb70288833f9c40c1953ba3734993c91b792359900219fd
SHA512f4b0b9503400b337798cbe3a48b7b5d2858da76b7892514e1d926459dbd8aae0881cec53f981c061789dd95844e459d701d32eee743403313dc623c0b27e955e
-
Filesize
63KB
MD5d1dcb18f3781186a95bf7f9c084ae511
SHA1140678a6122aea97d305499a806448098851dbbd
SHA25673732a9e253c1f80825b9fb8ea5fcded94907e6368d6d0b28ea5f45ade729ab4
SHA512e17810dbff395e79295cbef9c1d66000475302305386416651b08152b74f188ca39cac3f7715b2a0a34963c075716521553115ecdcd42c3bd52d56365feafb72