Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 01:53
General
-
Target
Bootstrapper.exe
-
Size
102KB
-
MD5
eca9c9b3eb8e5598f1dd7d6eea69d18a
-
SHA1
dbe5779142fbe19e46b3d6d6905838c7659c73e2
-
SHA256
7708a99cb7450d311bd52afbfabf544dad72481d5de5a931791945b279330bdf
-
SHA512
6cc229162b6ec43c1c1db33e197226f13bc778107cd7c18ab5b387ea16c868698842d89bc801236022b42ef5882cb803c2f5f418840c6b079f70e9a90bcc7154
-
SSDEEP
3072:luctTFw424SdI9yZbaO2TFzrjvd6xwDFkGruq6lTPsQC9t2P:lucQB+yZba/hTZ3/6dPnCu
Malware Config
Extracted
asyncrat
0.5.8
Victim
193.161.193.99:1194
zKBMm76IjaE5
-
delay
3
-
install
true
-
install_file
SysKeeperVLR.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\SysKeeperVLR.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
SysKeeperVLR.exepid process 1028 SysKeeperVLR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bootstrapper.execmd.execmd.exeschtasks.exetimeout.exeSysKeeperVLR.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SysKeeperVLR.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3996 timeout.exe -
Modifies registry class 4 IoCs
Processes:
BackgroundTransferHost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
Bootstrapper.exepid process 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe 4372 Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Bootstrapper.exeSysKeeperVLR.exedescription pid process Token: SeDebugPrivilege 4372 Bootstrapper.exe Token: SeDebugPrivilege 1028 SysKeeperVLR.exe Token: SeDebugPrivilege 1028 SysKeeperVLR.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 4696 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Bootstrapper.execmd.execmd.exedescription pid process target process PID 4372 wrote to memory of 4644 4372 Bootstrapper.exe cmd.exe PID 4372 wrote to memory of 4644 4372 Bootstrapper.exe cmd.exe PID 4372 wrote to memory of 4644 4372 Bootstrapper.exe cmd.exe PID 4372 wrote to memory of 3180 4372 Bootstrapper.exe cmd.exe PID 4372 wrote to memory of 3180 4372 Bootstrapper.exe cmd.exe PID 4372 wrote to memory of 3180 4372 Bootstrapper.exe cmd.exe PID 4644 wrote to memory of 2232 4644 cmd.exe schtasks.exe PID 4644 wrote to memory of 2232 4644 cmd.exe schtasks.exe PID 4644 wrote to memory of 2232 4644 cmd.exe schtasks.exe PID 3180 wrote to memory of 3996 3180 cmd.exe timeout.exe PID 3180 wrote to memory of 3996 3180 cmd.exe timeout.exe PID 3180 wrote to memory of 3996 3180 cmd.exe timeout.exe PID 3180 wrote to memory of 1028 3180 cmd.exe SysKeeperVLR.exe PID 3180 wrote to memory of 1028 3180 cmd.exe SysKeeperVLR.exe PID 3180 wrote to memory of 1028 3180 cmd.exe SysKeeperVLR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SysKeeperVLR" /tr '"C:\Users\Admin\AppData\Roaming\SysKeeperVLR.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SysKeeperVLR" /tr '"C:\Users\Admin\AppData\Roaming\SysKeeperVLR.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB93E.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3996
-
-
C:\Users\Admin\AppData\Roaming\SysKeeperVLR.exe"C:\Users\Admin\AppData\Roaming\SysKeeperVLR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2624
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4696
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\a7e07c23-b15e-4f58-b345-90e842703301.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
156B
MD5de2550a7386274875a24bb157c6c3ad1
SHA1ddcae39e7a1bf1488437ffae5eab7a1ba8ec1f7b
SHA2560cb2b86cfbcea1c290da78b934bbb900c371b7d38029b48b2e3e998937d28245
SHA51281c42602e187ccec1ba8c7f96a8d6c15920a24bea31fe3e614b3136f7c01d1754c55707b11690a54e95c3adfc3e9ea2f2437e911ef6d9da39f02adce4e17a6be
-
Filesize
102KB
MD5eca9c9b3eb8e5598f1dd7d6eea69d18a
SHA1dbe5779142fbe19e46b3d6d6905838c7659c73e2
SHA2567708a99cb7450d311bd52afbfabf544dad72481d5de5a931791945b279330bdf
SHA5126cc229162b6ec43c1c1db33e197226f13bc778107cd7c18ab5b387ea16c868698842d89bc801236022b42ef5882cb803c2f5f418840c6b079f70e9a90bcc7154