Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 05:33
Behavioral task
behavioral1
Sample
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe
Resource
win7-20240903-en
General
-
Target
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe
-
Size
47KB
-
MD5
b755853833e683e601e838ed7ca54867
-
SHA1
9ff8bf2710cfd25fa0fd07ea10e10f76910989a9
-
SHA256
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52
-
SHA512
6fe4139253b06499c735d1131fe368f93a064b573d8b7befd23836b707adda6adcdde991a49886d83dec7d08c3f6fba66ef083c5270c253162c59db88250b193
-
SSDEEP
768:kuI7lT8kPK2WUwq2Mmo2qsLe2TSKMfjPdPI7OS8hV/s0bNAtbamdxnHNlHt/1zwc:kuI7lT8kD2rHMLyiS8bNAtnrY3dgx
Malware Config
Extracted
asyncrat
0.5.8
Allahsiz
45.95.214.119:8080
euU8bJbAjw5V
-
delay
3
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023ae4-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe -
Executes dropped EXE 1 IoCs
pid Process 4768 Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5012 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe Token: SeDebugPrivilege 4768 Runtime Broker.exe Token: SeDebugPrivilege 4768 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3852 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 5088 wrote to memory of 3852 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 5088 wrote to memory of 3852 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 5088 wrote to memory of 3312 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 95 PID 5088 wrote to memory of 3312 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 95 PID 5088 wrote to memory of 3312 5088 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 95 PID 3852 wrote to memory of 3536 3852 cmd.exe 97 PID 3852 wrote to memory of 3536 3852 cmd.exe 97 PID 3852 wrote to memory of 3536 3852 cmd.exe 97 PID 3312 wrote to memory of 5012 3312 cmd.exe 98 PID 3312 wrote to memory of 5012 3312 cmd.exe 98 PID 3312 wrote to memory of 5012 3312 cmd.exe 98 PID 3312 wrote to memory of 4768 3312 cmd.exe 101 PID 3312 wrote to memory of 4768 3312 cmd.exe 101 PID 3312 wrote to memory of 4768 3312 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe"C:\Users\Admin\AppData\Local\Temp\308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC2A4.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5012
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5fe21472f363e1c9fc261e008d034220b
SHA1f3ae1fefd71d0640f3e8adf07c863ca418009b9c
SHA2568e9afab7109a58c691598f3b43327b85835c6fdf79095ea597074438e8d412b6
SHA512adeac6242c842a3ed476a397230a7e97ff8af6a0d535b80dd2f4289378fe6fb96c0d36dfc17aa37f051f3ba3bb1be1e749ddbc600d27a070fdf4f0dd05df8f85
-
Filesize
47KB
MD5b755853833e683e601e838ed7ca54867
SHA19ff8bf2710cfd25fa0fd07ea10e10f76910989a9
SHA256308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52
SHA5126fe4139253b06499c735d1131fe368f93a064b573d8b7befd23836b707adda6adcdde991a49886d83dec7d08c3f6fba66ef083c5270c253162c59db88250b193