Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-11-2024 17:25
Behavioral task
behavioral1
Sample
Test.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Test.exe
-
Size
4.0MB
-
MD5
55603e2a16f0a6d517d63ec1552e45ed
-
SHA1
2ebc5c1cbff5675f2c13f06e45e5039940107077
-
SHA256
bbd2b2f19bef121ba2bff9bc1a40227e8114494b55165f3cbd8e53e59fc9daec
-
SHA512
13475013baee647999c12ef8648492b7a841ed549582782ea45dccb0a5c4a05bcf3374374f1c72c5de8376741eb2ca5215f6d87a2802a4af49b56fd4cc2b7666
-
SSDEEP
768:WtoQVuOPx178nkC8A+XICpeyr61urX1+T4uoSBGHmDbDzph0oX3ZErGSucdpqKYC:WVxXPn0tYUbph93ZEFucdpqKmY7
Malware Config
Extracted
asyncrat
Victim
193.161.193.99:36700
-
delay
1
-
install
true
-
install_file
sysvlrhp.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00280000000450b3-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Test.exe -
Executes dropped EXE 1 IoCs
pid Process 4620 sysvlrhp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1244 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4232 Test.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe 4620 sysvlrhp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4232 Test.exe Token: SeDebugPrivilege 4620 sysvlrhp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4672 4232 Test.exe 82 PID 4232 wrote to memory of 4672 4232 Test.exe 82 PID 4232 wrote to memory of 4720 4232 Test.exe 84 PID 4232 wrote to memory of 4720 4232 Test.exe 84 PID 4672 wrote to memory of 4824 4672 cmd.exe 86 PID 4672 wrote to memory of 4824 4672 cmd.exe 86 PID 4720 wrote to memory of 1244 4720 cmd.exe 87 PID 4720 wrote to memory of 1244 4720 cmd.exe 87 PID 4720 wrote to memory of 4620 4720 cmd.exe 92 PID 4720 wrote to memory of 4620 4720 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Test.exe"C:\Users\Admin\AppData\Local\Temp\Test.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sysvlrhp" /tr '"C:\Users\Admin\AppData\Roaming\sysvlrhp.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "sysvlrhp" /tr '"C:\Users\Admin\AppData\Roaming\sysvlrhp.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8DD8.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1244
-
-
C:\Users\Admin\AppData\Roaming\sysvlrhp.exe"C:\Users\Admin\AppData\Roaming\sysvlrhp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f05d9cf4cf7372ee5e72822538216ab
SHA104d97e52a5c2111e677dba54e959f1658ba05beb
SHA25654553c3f246d8614f4f9308e296ad080bc2d222afcad198394dfde63da4d2f82
SHA5121a7ef7d16c5dcfb5598a735504dd0a2658d6faa5b0b14c2858725e495c94b5577d21b0dfccc95dc54d17d60882fb94df6a0c158f8574875e405397a1f605e58d
-
Filesize
4.0MB
MD555603e2a16f0a6d517d63ec1552e45ed
SHA12ebc5c1cbff5675f2c13f06e45e5039940107077
SHA256bbd2b2f19bef121ba2bff9bc1a40227e8114494b55165f3cbd8e53e59fc9daec
SHA51213475013baee647999c12ef8648492b7a841ed549582782ea45dccb0a5c4a05bcf3374374f1c72c5de8376741eb2ca5215f6d87a2802a4af49b56fd4cc2b7666