Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 00:53
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win7-20240903-en
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
9efaf6b98fdde9df4532d1236b60619f
-
SHA1
5d1414d09d54de16b04cd0cd05ccfc0692588fd1
-
SHA256
7c8a5e6cf4e451d61157e113f431a1f3e606fba0e7147ffa9a8f429cb60e47d6
-
SHA512
eabc2c58a7b2d636f13b149199f2dc943c4af3296c5a4605b72293294a449a2ea8da432238748ca2fb69fb944a31ac6fae7e5310cdc57609e5955f62b71e812d
-
SSDEEP
768:PHMvlKazXYN78NwC8A+XuqazcBRL5JTk1+T4KSBGHmDbD/ph0oXtKnk+SusdpqKX:EtTXA9dSJYUbdh9dJusdpqKmY7
Malware Config
Extracted
asyncrat
Default
forums-appliances.gl.at.ply.gg:1962
-
delay
1
-
install
true
-
install_file
windows.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\windows.exe family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Infected.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Infected.exe -
Executes dropped EXE 1 IoCs
Processes:
windows.exepid process 4064 windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3516 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Infected.exewindows.exepid process 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 3044 Infected.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe 4064 windows.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Infected.exewindows.exedescription pid process Token: SeDebugPrivilege 3044 Infected.exe Token: SeDebugPrivilege 3044 Infected.exe Token: SeDebugPrivilege 4064 windows.exe Token: SeDebugPrivilege 4064 windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Infected.execmd.execmd.exedescription pid process target process PID 3044 wrote to memory of 3460 3044 Infected.exe cmd.exe PID 3044 wrote to memory of 3460 3044 Infected.exe cmd.exe PID 3044 wrote to memory of 2932 3044 Infected.exe cmd.exe PID 3044 wrote to memory of 2932 3044 Infected.exe cmd.exe PID 2932 wrote to memory of 3516 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 3516 2932 cmd.exe timeout.exe PID 3460 wrote to memory of 816 3460 cmd.exe schtasks.exe PID 3460 wrote to memory of 816 3460 cmd.exe schtasks.exe PID 2932 wrote to memory of 4064 2932 cmd.exe windows.exe PID 2932 wrote to memory of 4064 2932 cmd.exe windows.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7F03.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3516
-
-
C:\Users\Admin\AppData\Roaming\windows.exe"C:\Users\Admin\AppData\Roaming\windows.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5da7c68c5ee583195595cf6ab8b1f3dba
SHA172f6b74599f3e0e12a623958fde7a0a01721f524
SHA2563540e9c6aa5c1d578ca34aae3a9ed993e648d90900ff0c7ac9362a2732068b86
SHA51262c64b428fffb76e35bfa54246fa097b42286508313bfe6d09dce5e1190f4f5ba85cb67f8f393e82ed0c95c737ace43012d726d19e3059be4c32919c5539cad5
-
Filesize
63KB
MD59efaf6b98fdde9df4532d1236b60619f
SHA15d1414d09d54de16b04cd0cd05ccfc0692588fd1
SHA2567c8a5e6cf4e451d61157e113f431a1f3e606fba0e7147ffa9a8f429cb60e47d6
SHA512eabc2c58a7b2d636f13b149199f2dc943c4af3296c5a4605b72293294a449a2ea8da432238748ca2fb69fb944a31ac6fae7e5310cdc57609e5955f62b71e812d