Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 06:43
Behavioral task
behavioral1
Sample
bundy.exe
Resource
win7-20241023-en
General
-
Target
bundy.exe
-
Size
45KB
-
MD5
7f6f0f84c1ebc50ef5b07b400e3055b9
-
SHA1
ff1d521cd7e28db6a80fcb6a0937eab2efba8292
-
SHA256
ba4e656f1e01be59a74dd10864d9bc50d9add5647c2d860a6d1ad183008a39fb
-
SHA512
ba65999a790f0c76e315e023e69a1d748187ce1f7b4a68ab34618df97265dc5b16663251dcec14b6ee5bcb825094fba8049c088f9ae150edaf8fa62bf6c7fdfb
-
SSDEEP
768:Fuu11TwQsOnFWUFN1/mo2qD60YFK8oubbbQtTk/nPIAdzjbigX3iyX72osKkPNDo:Fuu11TwSb22YnctTiAAd3bFXSS72osKP
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
76neALhoLeyJ
-
delay
3
-
install
true
-
install_file
bundy.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bundy.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
bundy.exepid process 2792 bundy.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2304 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bundy.execmd.execmd.exeschtasks.exetimeout.exebundy.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bundy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bundy.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2684 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
bundy.exepid process 1988 bundy.exe 1988 bundy.exe 1988 bundy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bundy.exebundy.exedescription pid process Token: SeDebugPrivilege 1988 bundy.exe Token: SeDebugPrivilege 2792 bundy.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bundy.execmd.execmd.exedescription pid process target process PID 1988 wrote to memory of 1900 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 1900 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 1900 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 1900 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 2304 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 2304 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 2304 1988 bundy.exe cmd.exe PID 1988 wrote to memory of 2304 1988 bundy.exe cmd.exe PID 1900 wrote to memory of 2908 1900 cmd.exe schtasks.exe PID 1900 wrote to memory of 2908 1900 cmd.exe schtasks.exe PID 1900 wrote to memory of 2908 1900 cmd.exe schtasks.exe PID 1900 wrote to memory of 2908 1900 cmd.exe schtasks.exe PID 2304 wrote to memory of 2684 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 2684 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 2684 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 2684 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 2792 2304 cmd.exe bundy.exe PID 2304 wrote to memory of 2792 2304 cmd.exe bundy.exe PID 2304 wrote to memory of 2792 2304 cmd.exe bundy.exe PID 2304 wrote to memory of 2792 2304 cmd.exe bundy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bundy.exe"C:\Users\Admin\AppData\Local\Temp\bundy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "bundy" /tr '"C:\Users\Admin\AppData\Roaming\bundy.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "bundy" /tr '"C:\Users\Admin\AppData\Roaming\bundy.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC072.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\bundy.exe"C:\Users\Admin\AppData\Roaming\bundy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD55a22e3d3d08f4cb20635206caad00bae
SHA17252ee7cf5247ccedf6923dd212632a8952b8a96
SHA256466f92137918c78339b54031575fea0d75a940c54d397998692dbc5ecbcad896
SHA512d68690b64abab7c00684b81bfb696243d81d9ca81a66f0098a92371ed9ccffcfd5c6596583dabbf621891d6da273deff2d4439fa8ed5de78471f261da4015a83
-
Filesize
45KB
MD57f6f0f84c1ebc50ef5b07b400e3055b9
SHA1ff1d521cd7e28db6a80fcb6a0937eab2efba8292
SHA256ba4e656f1e01be59a74dd10864d9bc50d9add5647c2d860a6d1ad183008a39fb
SHA512ba65999a790f0c76e315e023e69a1d748187ce1f7b4a68ab34618df97265dc5b16663251dcec14b6ee5bcb825094fba8049c088f9ae150edaf8fa62bf6c7fdfb