Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 14:59
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
608c690f9f2eb09d832dc26b007694b5
-
SHA1
894dc8eadbc184a2b327ae771850cc726ebf26a0
-
SHA256
d145af0585628070c716f9ee1ce63e4da0b239d72e3dbf41683abb9db2f7a5af
-
SHA512
b2bde1f1679056c65123d09bb50236909843e05cf7e0e714cb3a7ab4a510088070e2f0f797153b65a0955b94113a5b437e91854d194c2a1631ec9779d427c346
-
SSDEEP
768:luny5TgoqzqWU8d9rmo2qrgKjPGaG6PIyzjbFgX3ir3ITlDzwIjr8HTOyBDZrx:luny5TgNR25KTkDy3bCXSr3k/wIjIHi8
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.244.72:6606
192.168.244.72:7707
192.168.244.72:8808
192.168.244.72:3000
192.168.244.1:6606
192.168.244.1:7707
192.168.244.1:8808
192.168.244.1:3000
KRVJ4XZBrwB4
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AsyncClient.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
taskmgr.exepid process 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1556 taskmgr.exe Token: SeSystemProfilePrivilege 1556 taskmgr.exe Token: SeCreateGlobalPrivilege 1556 taskmgr.exe Token: 33 1556 taskmgr.exe Token: SeIncBasePriorityPrivilege 1556 taskmgr.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
taskmgr.exepid process 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe -
Suspicious use of SendNotifyMessage 46 IoCs
Processes:
taskmgr.exepid process 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe 1556 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2460
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1556