Resubmissions
11-11-2024 13:51
241111-q54elszdrl 1011-11-2024 13:41
241111-qy5zvstjer 1011-11-2024 13:36
241111-qwhrjszdkn 1011-11-2024 13:30
241111-qr3k6azcqp 10Analysis
-
max time kernel
1199s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
SunlightBootstrapper.exe
Resource
win7-20241010-en
General
-
Target
SunlightBootstrapper.exe
-
Size
1.8MB
-
MD5
7c4f1852448b6217ca92deecaceb6247
-
SHA1
23f8b47a3a5bbcadb7d01dd8a727e0c2c48c0848
-
SHA256
8f6baf69e7e047012b20299cd4d3bf4f86eaee8c7f42fed6cb4a33b79ef51dd2
-
SHA512
4ef4281529f2159761f11ad890da0f7d79e2513019a1fd717b312ef2fb0ef9d01a54cb07561e40b0c12edd46089a8228f977ebb2ac109939bdddda57fad2f812
-
SSDEEP
24576:dsmUYlIZ2RBbEeUhk7Dz6rdnkYA1LUqBFJJCZm4E6+eQ:emUYlIckeUAGnmLtFaZ0pe
Malware Config
Extracted
asyncrat
0.5.8
Default
109.87.212.225:1337
oIyMus9FxRxA
-
delay
3
-
install
true
-
install_file
dwm.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Modifies security service 2 TTPs 2 IoCs
Processes:
disable-defender.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "3" disable-defender.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" disable-defender.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023c93-6.dat family_asyncrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SunlightBootstrapper.exetmpA41F.tmp.comSunlightBootstrapper.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SunlightBootstrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation tmpA41F.tmp.com Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation SunlightBootstrapper.exe -
Executes dropped EXE 6 IoCs
Processes:
tmpA41F.tmp.comdwm.exeSunlightBootstrapper.exetmp873C.tmp.comdisable-defender.exedisable-defender.exepid Process 3424 tmpA41F.tmp.com 5108 dwm.exe 4648 SunlightBootstrapper.exe 1612 tmp873C.tmp.com 1912 disable-defender.exe 5768 disable-defender.exe -
Processes:
disable-defender.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" disable-defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features disable-defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" disable-defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\DisableAntiSpyware = "1" disable-defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection disable-defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tmp873C.tmp.comtmpA41F.tmp.comcmd.execmd.exetimeout.exeschtasks.exedwm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp873C.tmp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpA41F.tmp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwm.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2724 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
Processes:
msedge.exedescription ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 103906.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 46387.crdownload:SmartScreen msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid Process 2984 vlc.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
tmpA41F.tmp.commsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exedisable-defender.exedisable-defender.exemsedge.exesdiagnhost.exemsedge.exepid Process 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 3424 tmpA41F.tmp.com 4876 msedge.exe 4876 msedge.exe 3368 msedge.exe 3368 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 6016 msedge.exe 6016 msedge.exe 6108 msedge.exe 6108 msedge.exe 1912 disable-defender.exe 1912 disable-defender.exe 5768 disable-defender.exe 5768 disable-defender.exe 5840 msedge.exe 5840 msedge.exe 5840 msedge.exe 5840 msedge.exe 5996 sdiagnhost.exe 5996 sdiagnhost.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
vlc.exedwm.exepid Process 2984 vlc.exe 5108 dwm.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid Process 4