Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 01:39
Behavioral task
behavioral1
Sample
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe
Resource
win7-20241010-en
General
-
Target
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe
-
Size
47KB
-
MD5
b755853833e683e601e838ed7ca54867
-
SHA1
9ff8bf2710cfd25fa0fd07ea10e10f76910989a9
-
SHA256
308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52
-
SHA512
6fe4139253b06499c735d1131fe368f93a064b573d8b7befd23836b707adda6adcdde991a49886d83dec7d08c3f6fba66ef083c5270c253162c59db88250b193
-
SSDEEP
768:kuI7lT8kPK2WUwq2Mmo2qsLe2TSKMfjPdPI7OS8hV/s0bNAtbamdxnHNlHt/1zwc:kuI7lT8kD2rHMLyiS8bNAtnrY3dgx
Malware Config
Extracted
asyncrat
0.5.8
Allahsiz
45.95.214.119:8080
euU8bJbAjw5V
-
delay
3
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023b67-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe -
Executes dropped EXE 1 IoCs
pid Process 3824 Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5048 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe Token: SeDebugPrivilege 3824 Runtime Broker.exe Token: SeDebugPrivilege 3824 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1624 wrote to memory of 4276 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 91 PID 1624 wrote to memory of 4276 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 91 PID 1624 wrote to memory of 4276 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 91 PID 1624 wrote to memory of 3336 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 1624 wrote to memory of 3336 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 1624 wrote to memory of 3336 1624 308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe 93 PID 4276 wrote to memory of 812 4276 cmd.exe 95 PID 4276 wrote to memory of 812 4276 cmd.exe 95 PID 4276 wrote to memory of 812 4276 cmd.exe 95 PID 3336 wrote to memory of 5048 3336 cmd.exe 96 PID 3336 wrote to memory of 5048 3336 cmd.exe 96 PID 3336 wrote to memory of 5048 3336 cmd.exe 96 PID 3336 wrote to memory of 3824 3336 cmd.exe 98 PID 3336 wrote to memory of 3824 3336 cmd.exe 98 PID 3336 wrote to memory of 3824 3336 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe"C:\Users\Admin\AppData\Local\Temp\308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB72A.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5048
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5b4a4c2a1f99ff7a637b7815cca06af4c
SHA17a47f56707e2d64f2822178e96f546a32fda1c4b
SHA25618c6a58be5d08ea767c2e673c61b768f746b3f4213ef4d8fa43b9e15f78ad14d
SHA512dcf6102957af4b9fe6f7bcd3a72bcd31162905af049913a7ac4f14a1db5da6a8be30f2b6e328cc8c17603a97d03edcbfa862556da5e8bc7bbc0fae04ac57ac28
-
Filesize
47KB
MD5b755853833e683e601e838ed7ca54867
SHA19ff8bf2710cfd25fa0fd07ea10e10f76910989a9
SHA256308e5523c1588d1ba9b89d48c32a0171a674f34c8e50407cc307b56d92bb9a52
SHA5126fe4139253b06499c735d1131fe368f93a064b573d8b7befd23836b707adda6adcdde991a49886d83dec7d08c3f6fba66ef083c5270c253162c59db88250b193