Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 05:40
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Client.exe
-
Size
47KB
-
MD5
9054f16d3546d47e5c292b55a57b57a5
-
SHA1
65747cde93ecade78592ba939b344a8d430faffd
-
SHA256
2ba8e9c8f1451fc0f3d1e13c268c9507a53c8e7d19346a5a52ad7c7481494f4e
-
SHA512
0876fb8222706c5344e46d468a13a8eaf8bb940925c05c46984c09be589a568f9007cd7e4b3eaa79434301377026cbea4af3aa644da82b7fca5959b332628aae
-
SSDEEP
768:p9n7mxUzILWCaS+DiMtelDSN+iV08YbygesnQWqxvEgK/JnZVc6KN:p97AKWMtKDs4zb1rxcnkJnZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
form-skin.gl.at.ply.gg:4159
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_file
NursultanLoader.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
taskmgr.exepid process 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4460 taskmgr.exe Token: SeSystemProfilePrivilege 4460 taskmgr.exe Token: SeCreateGlobalPrivilege 4460 taskmgr.exe Token: 33 4460 taskmgr.exe Token: SeIncBasePriorityPrivilege 4460 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
taskmgr.exepid process 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
taskmgr.exepid process 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe 4460 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵PID:640
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4460