Overview
overview
10Static
static
559acf29870...18.exe
windows7-x64
1059acf29870...18.exe
windows10-2004-x64
10Adobe-GenP-2.7.exe
windows7-x64
3Adobe-GenP-2.7.exe
windows10-2004-x64
3ETC1final.exe
windows7-x64
8ETC1final.exe
windows10-2004-x64
8XMRfinal.exe
windows7-x64
8XMRfinal.exe
windows10-2004-x64
10update.exe
windows7-x64
10update.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
59acf298702bd7b13089a8883460fde5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59acf298702bd7b13089a8883460fde5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Adobe-GenP-2.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Adobe-GenP-2.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ETC1final.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ETC1final.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XMRfinal.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XMRfinal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
update.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
update.exe
Resource
win10v2004-20241007-en
General
-
Target
update.exe
-
Size
375KB
-
MD5
3ea6458b6a66860e0b494f4d23d80991
-
SHA1
e32f4c1d1601997a6c3a5745de5be87b84ffb167
-
SHA256
005e7927bf7df1153921f511ac3fe6527f039db911cec0d9ad7201bfa65054bf
-
SHA512
44487f251fd8f9f0a0adfaf7da10da43a58d22b3332cf15a8d88a407c56838f331468eb249d995a28a57c0992361c810501c0062be53791d12000df267ab5cee
-
SSDEEP
6144:kqzLj+4PhWh/WBdhK2f7qDyFNQwprWEBX5r95yIpFyBNhg5OD6t+hjCMSsCmvEs3:R3j+4YEB/K2f777prWEBD5nu+5OD6sYq
Malware Config
Extracted
asyncrat
1.0.7
Default
service32.sytes.net:8848
NFHaufhauiwfhawfw
-
delay
1
-
install
false
-
install_file
vmdservice.exe
-
install_folder
%AppData%
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service = "C:\\Users\\Admin\\AppData\\Roaming\\update.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
update.exedescription pid process target process PID 4856 set thread context of 2752 4856 update.exe aspnet_compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
update.execmd.exereg.exeaspnet_compiler.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
update.exedescription pid process Token: SeDebugPrivilege 4856 update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
update.execmd.exedescription pid process target process PID 4856 wrote to memory of 2124 4856 update.exe cmd.exe PID 4856 wrote to memory of 2124 4856 update.exe cmd.exe PID 4856 wrote to memory of 2124 4856 update.exe cmd.exe PID 2124 wrote to memory of 2224 2124 cmd.exe reg.exe PID 2124 wrote to memory of 2224 2124 cmd.exe reg.exe PID 2124 wrote to memory of 2224 2124 cmd.exe reg.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe PID 4856 wrote to memory of 2752 4856 update.exe aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c copy update.exe %APPDATA% && reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Service /D "%APPDATA%\update.exe" -f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Service /D "C:\Users\Admin\AppData\Roaming\update.exe" -f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵
- System Location Discovery: System Language Discovery
PID:2752