Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-10-2024 19:43
General
-
Target
test.exe
-
Size
63KB
-
MD5
0447433dfae1ac5541b97ecd741748e2
-
SHA1
7b57fb403d446629bbd72d632547c4d25f27a993
-
SHA256
9a97697b68656797144bb25ad73bf31719f8ae7f28a70bb06a84ad0077d5ad0a
-
SHA512
4ec5b2f01a880e8995da2130a599ca5973614a11fa964cfd002fe305197ade558470249fa564eecf3d216a8f5e20bc0f9eb2fade30b6f5a92771630b8b66ef08
-
SSDEEP
768:jnuguX1wbgyX78dIC8A+XkuazcBRL5JTk1+T4KSBGHmDbD/ph0oXtJzm1leSuEdP:rvCCPTDdSJYUbdh9tR2lpuEdpqKmY7
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
127.0.0.1:3232
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2160 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
test.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 236 test.exe Token: SeDebugPrivilege 2160 taskmgr.exe Token: SeSystemProfilePrivilege 2160 taskmgr.exe Token: SeCreateGlobalPrivilege 2160 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe 2160 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:236
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2160