Resubmissions
12-10-2024 13:44
241012-q146catbqh 10Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 13:44
General
-
Target
download.exe
-
Size
45KB
-
MD5
430ff68d51dfa08182c6540b262d6c18
-
SHA1
94356e67fd6dc5b06c33db8717ee09c6fe6487e4
-
SHA256
0206eac25c569573e6495bb3d9acce2ca66bccd39f80c21d0fd3471e4c1739fe
-
SHA512
615fe8a1cb22961369d8904f12b7f33a247fa3ca870382c7dd4e7f51fcf686a5897e94debb37b112b8db79e2aecde2837148c630a5a84ecfb3d30eb8009e63d1
-
SSDEEP
768:mu/dRTUo0HQbWUnmjSmo2qMwKjPGaG6PIyzjbFgX3ilLg64uoJT5qRPDBDZyx:mu/dRTUPE2kKTkDy3bCXSdZST5qRtdyx
Malware Config
Extracted
asyncrat
0.5.8
Default
149.13.5.179:5050
bGdweJH2KLby
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
download.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language download.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1216 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1216 taskmgr.exe Token: SeSystemProfilePrivilege 1216 taskmgr.exe Token: SeCreateGlobalPrivilege 1216 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe 1216 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4940
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1216