Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    16-11-2024 06:53

General

  • Target

    Api-AutoUpdater.exe

  • Size

    63KB

  • MD5

    e8df591dd750558b2643bb1332c5245c

  • SHA1

    418f549bca86c939f4fcb250a18ac3467eb4c2ca

  • SHA256

    721fb4159bb039e3dcf8e2bc2ba3b24ed75eaf52ec94a35765cede3660917ad3

  • SHA512

    a6d0aa3cebd0928833d01e3fe4e39409dc06ec9d01d0342d42d2e42746fe57f7621c7f116a4d2650bb9efea9e5b77a074d12d58581b057eb2dd9994fcddfd93f

  • SSDEEP

    1536:TeQPczZ9d84YUbAhed527Iu4ucdpqKmY7:TeDzZ9d9YUbATIuaGz

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

specific-charles.gl.at.ply.gg:7777

Attributes
  • delay

    1

  • install

    true

  • install_file

    WIndows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Api-AutoUpdater.exe
    "C:\Users\Admin\AppData\Local\Temp\Api-AutoUpdater.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WIndows" /tr '"C:\Users\Admin\AppData\Roaming\WIndows.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "WIndows" /tr '"C:\Users\Admin\AppData\Roaming\WIndows.exe"'
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp83E5.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3472
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3196
      • C:\Users\Admin\AppData\Roaming\WIndows.exe
        "C:\Users\Admin\AppData\Roaming\WIndows.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
      PID:3248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp83E5.tmp.bat

      Filesize

      151B

      MD5

      50545da4df6dad8803eebce5445f8384

      SHA1

      484139bd8b58fbc08781a9791114a5cb8bf7d03e

      SHA256

      be20b7b3a847cedf5840e62125c034175748bd8a99e1042882ddd1a13a76049b

      SHA512

      6c3e4c6a5c1aaafaae9ce0b30bba27980c1b9530a7a2eddb1fe8fc3f46c5afd4854b10267d6ffb9cda7ba5e7d7a72ebc73631057cb98ab1c24a5f7b0665de4c8

    • C:\Users\Admin\AppData\Roaming\WIndows.exe

      Filesize

      63KB

      MD5

      e8df591dd750558b2643bb1332c5245c

      SHA1

      418f549bca86c939f4fcb250a18ac3467eb4c2ca

      SHA256

      721fb4159bb039e3dcf8e2bc2ba3b24ed75eaf52ec94a35765cede3660917ad3

      SHA512

      a6d0aa3cebd0928833d01e3fe4e39409dc06ec9d01d0342d42d2e42746fe57f7621c7f116a4d2650bb9efea9e5b77a074d12d58581b057eb2dd9994fcddfd93f

    • memory/868-0-0x00007FFCFF753000-0x00007FFCFF755000-memory.dmp

      Filesize

      8KB

    • memory/868-1-0x0000000000030000-0x0000000000046000-memory.dmp

      Filesize

      88KB

    • memory/868-2-0x00007FFCFF750000-0x00007FFD00212000-memory.dmp

      Filesize

      10.8MB

    • memory/868-3-0x00007FFCFF750000-0x00007FFD00212000-memory.dmp

      Filesize

      10.8MB

    • memory/868-8-0x00007FFCFF750000-0x00007FFD00212000-memory.dmp

      Filesize

      10.8MB