Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 15:00
Behavioral task
behavioral1
Sample
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe
Resource
win7-20240903-en
General
-
Target
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe
-
Size
4.0MB
-
MD5
0bca1c34f121425ad181097f4401aa00
-
SHA1
b2450a936001d83c5029df4933b26d9b1732fc9c
-
SHA256
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31b
-
SHA512
86b9beb0001553f9b898bc9ba130e39949642ae3d027b7fefc6f3252002ab62679de4f6eb70d00555b43f8131b3480821b3fc182f374fc53a479117140407340
-
SSDEEP
12288:jiG3ngP7iw2yTRruvLG2b2iGDMiGDiLuL:X3gTqURCqlDIDe
Malware Config
Extracted
asyncrat
0.5.7B
Default
154.216.17.155:8808
154.216.17.155:7707
AsyncMutex_6SI8OkPnk
-
delay
45
-
install
true
-
install_file
vscr.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\vscr.exe family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe -
Executes dropped EXE 1 IoCs
Processes:
vscr.exepid process 2164 vscr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.execmd.execmd.exeschtasks.exetimeout.exevscr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vscr.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4908 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exepid process 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exevscr.exedescription pid process Token: SeDebugPrivilege 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe Token: SeDebugPrivilege 2164 vscr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.execmd.execmd.exedescription pid process target process PID 636 wrote to memory of 1272 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 636 wrote to memory of 1272 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 636 wrote to memory of 1272 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 636 wrote to memory of 2400 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 636 wrote to memory of 2400 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 636 wrote to memory of 2400 636 d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe cmd.exe PID 1272 wrote to memory of 3360 1272 cmd.exe schtasks.exe PID 1272 wrote to memory of 3360 1272 cmd.exe schtasks.exe PID 1272 wrote to memory of 3360 1272 cmd.exe schtasks.exe PID 2400 wrote to memory of 4908 2400 cmd.exe timeout.exe PID 2400 wrote to memory of 4908 2400 cmd.exe timeout.exe PID 2400 wrote to memory of 4908 2400 cmd.exe timeout.exe PID 2400 wrote to memory of 2164 2400 cmd.exe vscr.exe PID 2400 wrote to memory of 2164 2400 cmd.exe vscr.exe PID 2400 wrote to memory of 2164 2400 cmd.exe vscr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe"C:\Users\Admin\AppData\Local\Temp\d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31bN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "vscr" /tr '"C:\Users\Admin\AppData\Roaming\vscr.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "vscr" /tr '"C:\Users\Admin\AppData\Roaming\vscr.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5743.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4908 -
C:\Users\Admin\AppData\Roaming\vscr.exe"C:\Users\Admin\AppData\Roaming\vscr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD59a3d2ba34a77b58972e20e90cb86fdc3
SHA101d1194b2166078c034cb7107f8f3ed8e498159c
SHA2562737dfab2f8816ae063e43fd0170cc86d2d31c609da7d372eb12469c55483286
SHA512fbee035f1e827add5964325b4c9a3ffe3f72baaaebacb1aea818d83795c048d757805598598a27d1b98a8c2c73dd4ab0b6856a0b569601f9483733925d603ef5
-
Filesize
4.0MB
MD50bca1c34f121425ad181097f4401aa00
SHA1b2450a936001d83c5029df4933b26d9b1732fc9c
SHA256d995f4f7da717e21da338606f0ca494c6ad920b261114fb965be06d1fd1ad31b
SHA51286b9beb0001553f9b898bc9ba130e39949642ae3d027b7fefc6f3252002ab62679de4f6eb70d00555b43f8131b3480821b3fc182f374fc53a479117140407340