Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 15:46
Behavioral task
behavioral1
Sample
search.exe
Resource
win7-20240903-en
General
-
Target
search.exe
-
Size
63KB
-
MD5
4a3d7bd2084b48024bf8f459b10aa913
-
SHA1
ed47940c8e00f846e0656bd95ca14ddd8d157ba0
-
SHA256
7c15fa68e1ae83f81c98a2c616753777ccd720a8a2a1adda490e08be9369a3c8
-
SHA512
94e00110aa23f713e099039b027d01e7ea1c5521b4f9b6563cebf537eafb226a3aa840d7f3f4ec08872ec098bd57567c3fd8c3694ea62468139ae84ee5cc5b35
-
SSDEEP
768:RdGnVhwdjndk78TQC8A+XiuazcBRL5JTk1+T4KSBGHmDbD/ph0oXkDkhgOSuAdph:mnSdsNdSJYUbdh9kcIuAdpqKmY7
Malware Config
Extracted
asyncrat
Default
natural-familiar.gl.at.ply.gg:65030
-
delay
1
-
install
true
-
install_file
search.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\search.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
search.exepid process 2672 search.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2780 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
search.exepid process 2668 search.exe 2668 search.exe 2668 search.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
search.exesearch.exedescription pid process Token: SeDebugPrivilege 2668 search.exe Token: SeDebugPrivilege 2668 search.exe Token: SeDebugPrivilege 2672 search.exe Token: SeDebugPrivilege 2672 search.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
search.execmd.execmd.exedescription pid process target process PID 2668 wrote to memory of 2760 2668 search.exe cmd.exe PID 2668 wrote to memory of 2760 2668 search.exe cmd.exe PID 2668 wrote to memory of 2760 2668 search.exe cmd.exe PID 2668 wrote to memory of 2676 2668 search.exe cmd.exe PID 2668 wrote to memory of 2676 2668 search.exe cmd.exe PID 2668 wrote to memory of 2676 2668 search.exe cmd.exe PID 2676 wrote to memory of 2780 2676 cmd.exe timeout.exe PID 2676 wrote to memory of 2780 2676 cmd.exe timeout.exe PID 2676 wrote to memory of 2780 2676 cmd.exe timeout.exe PID 2760 wrote to memory of 1220 2760 cmd.exe schtasks.exe PID 2760 wrote to memory of 1220 2760 cmd.exe schtasks.exe PID 2760 wrote to memory of 1220 2760 cmd.exe schtasks.exe PID 2676 wrote to memory of 2672 2676 cmd.exe search.exe PID 2676 wrote to memory of 2672 2676 cmd.exe search.exe PID 2676 wrote to memory of 2672 2676 cmd.exe search.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\search.exe"C:\Users\Admin\AppData\Local\Temp\search.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "search" /tr '"C:\Users\Admin\AppData\Roaming\search.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "search" /tr '"C:\Users\Admin\AppData\Roaming\search.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1220 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF1BE.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2780 -
C:\Users\Admin\AppData\Roaming\search.exe"C:\Users\Admin\AppData\Roaming\search.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5b1d0a0e38eae77faab83d6e673dae041
SHA1ac90dd6bb3eae81355b6f112528fa888d224139e
SHA2564028dbcfbc07d56aea281d2cff4f15318dc5ec7586952ca93023d3578ca9115b
SHA512ccd8651e2a3155f600588af133db1efb0c4cd3d4015466d58e48a5a2f466874cf0926d5699abf8241647e917d5ad38042a51af05d4d61df1bfbc15f2ecdea642
-
Filesize
63KB
MD54a3d7bd2084b48024bf8f459b10aa913
SHA1ed47940c8e00f846e0656bd95ca14ddd8d157ba0
SHA2567c15fa68e1ae83f81c98a2c616753777ccd720a8a2a1adda490e08be9369a3c8
SHA51294e00110aa23f713e099039b027d01e7ea1c5521b4f9b6563cebf537eafb226a3aa840d7f3f4ec08872ec098bd57567c3fd8c3694ea62468139ae84ee5cc5b35