Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 17:12
Behavioral task
behavioral1
Sample
rex.exe
Resource
win7-20240903-en
General
-
Target
rex.exe
-
Size
3.8MB
-
MD5
f9167c360e2d98e3d6cdc7bd1bbb6bbb
-
SHA1
5c1f2e1fb6c9767948ef64e822ef53b3059a8410
-
SHA256
6dbb801d621a57c4b4cb499acabaaa597c27db6050a7e98eb22d5111a0d4dea6
-
SHA512
d0e5eebe6a786321c3677d79ebbf0149d7fd5c4a0b95e717c8bd49c7f266a8bac9a077a473dd7a5711005afdb2bf9f1d95efed9fa7e2397b41a71b772c1883d6
-
SSDEEP
1536:Yu6ZdTv2S2deM1+paj/6GUIbJUuBoYudId44:Yu6vTv2S2dr1Aaj/1UIbJUuB4iu4
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
WJ7ad2hfOKxk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rex.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation rex.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2856 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exetimeout.exesvchost.exerex.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 432 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
rex.exepid process 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe 1904 rex.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rex.exesvchost.exedescription pid process Token: SeDebugPrivilege 1904 rex.exe Token: SeDebugPrivilege 2856 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rex.execmd.execmd.exedescription pid process target process PID 1904 wrote to memory of 3568 1904 rex.exe cmd.exe PID 1904 wrote to memory of 3568 1904 rex.exe cmd.exe PID 1904 wrote to memory of 3568 1904 rex.exe cmd.exe PID 1904 wrote to memory of 4496 1904 rex.exe cmd.exe PID 1904 wrote to memory of 4496 1904 rex.exe cmd.exe PID 1904 wrote to memory of 4496 1904 rex.exe cmd.exe PID 3568 wrote to memory of 424 3568 cmd.exe schtasks.exe PID 3568 wrote to memory of 424 3568 cmd.exe schtasks.exe PID 3568 wrote to memory of 424 3568 cmd.exe schtasks.exe PID 4496 wrote to memory of 432 4496 cmd.exe timeout.exe PID 4496 wrote to memory of 432 4496 cmd.exe timeout.exe PID 4496 wrote to memory of 432 4496 cmd.exe timeout.exe PID 4496 wrote to memory of 2856 4496 cmd.exe svchost.exe PID 4496 wrote to memory of 2856 4496 cmd.exe svchost.exe PID 4496 wrote to memory of 2856 4496 cmd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rex.exe"C:\Users\Admin\AppData\Local\Temp\rex.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD5DE.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:432 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5f9167c360e2d98e3d6cdc7bd1bbb6bbb
SHA15c1f2e1fb6c9767948ef64e822ef53b3059a8410
SHA2566dbb801d621a57c4b4cb499acabaaa597c27db6050a7e98eb22d5111a0d4dea6
SHA512d0e5eebe6a786321c3677d79ebbf0149d7fd5c4a0b95e717c8bd49c7f266a8bac9a077a473dd7a5711005afdb2bf9f1d95efed9fa7e2397b41a71b772c1883d6
-
Filesize
154B
MD58c86b4d625a619888f049d8998170695
SHA1bbd9cc32208aab63f77acfcd838d0a6d604d18a0
SHA2564ab3b09d6dcce9514deceea00aa909fdbbd5b958c14ff7d48c60f805b9e6e6c5
SHA5121a2ef3994d3ccd416252f35e57d306a5dd315df6e981268cff8b120f7a8dce29a5c0e4bf77aeef95985a1c91a9fc65968cc3ecfb3c32a50666a08d4b015f661c