Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 05:57
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win7-20240729-en
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
c8b877cb0d39bd95d7069f5b4c23612a
-
SHA1
5fb64bfb87b525c12d424baeb3128ddcde85a4de
-
SHA256
a2026da11259eef54d6162eafef538d915895fcd42d42dae5d0c65c975c07145
-
SHA512
0b1fb239a7eaad73e9d965e5ffa9b8ad0ebf44e5e799ffb0570eafa4c4895d936619321bf577d89ff6c31b338854d667fafc8317bfea40c7f9a7d6fe397bcab0
-
SSDEEP
768:tYtz5i7QHEU78j8C8A+Xi+azcBRL5JTk1+T4KSBGHmDbD/ph0oXcpBSuZCdpqKYC:tGIgE8ddSJYUbdh9XuZCdpqKmY7
Malware Config
Extracted
asyncrat
Default
consumer-cms.gl.at.ply.gg:2155
-
delay
1
-
install
true
-
install_file
SteamWebHelper.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\SteamWebHelper.exe family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Infected.exeSteamWebHelper.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Infected.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation SteamWebHelper.exe -
Executes dropped EXE 1 IoCs
Processes:
SteamWebHelper.exepid process 3996 SteamWebHelper.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4012 timeout.exe 2372 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Infected.exeSteamWebHelper.exepid process 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 1040 Infected.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe 3996 SteamWebHelper.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Infected.exeSteamWebHelper.exedescription pid process Token: SeDebugPrivilege 1040 Infected.exe Token: SeDebugPrivilege 3996 SteamWebHelper.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Infected.execmd.execmd.exeSteamWebHelper.execmd.execmd.exedescription pid process target process PID 1040 wrote to memory of 2452 1040 Infected.exe cmd.exe PID 1040 wrote to memory of 2452 1040 Infected.exe cmd.exe PID 1040 wrote to memory of 2364 1040 Infected.exe cmd.exe PID 1040 wrote to memory of 2364 1040 Infected.exe cmd.exe PID 2364 wrote to memory of 4012 2364 cmd.exe timeout.exe PID 2364 wrote to memory of 4012 2364 cmd.exe timeout.exe PID 2452 wrote to memory of 2804 2452 cmd.exe schtasks.exe PID 2452 wrote to memory of 2804 2452 cmd.exe schtasks.exe PID 2364 wrote to memory of 3996 2364 cmd.exe SteamWebHelper.exe PID 2364 wrote to memory of 3996 2364 cmd.exe SteamWebHelper.exe PID 3996 wrote to memory of 2380 3996 SteamWebHelper.exe cmd.exe PID 3996 wrote to memory of 2380 3996 SteamWebHelper.exe cmd.exe PID 3996 wrote to memory of 3756 3996 SteamWebHelper.exe cmd.exe PID 3996 wrote to memory of 3756 3996 SteamWebHelper.exe cmd.exe PID 3756 wrote to memory of 2372 3756 cmd.exe timeout.exe PID 3756 wrote to memory of 2372 3756 cmd.exe timeout.exe PID 2380 wrote to memory of 3932 2380 cmd.exe schtasks.exe PID 2380 wrote to memory of 3932 2380 cmd.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SteamWebHelper" /tr '"C:\Users\Admin\AppData\Roaming\SteamWebHelper.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SteamWebHelper" /tr '"C:\Users\Admin\AppData\Roaming\SteamWebHelper.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCDA0.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\SteamWebHelper.exe"C:\Users\Admin\AppData\Roaming\SteamWebHelper.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "SteamWebHelper"4⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "SteamWebHelper"5⤵PID:3932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAA83.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163B
MD508db42bf371cb1d2dba1d3b3e701258e
SHA17feca3b43068d16c2b2436cb1ae340e6b4755a7f
SHA2567b41768bd87d2487c9aabc95b60526a7f299cd1b1f2dbacdcc8c6c4de0bbf3f8
SHA5124eada9898674c03208a7b06f79f2780168857d479e92185f9d8d60ed430585ab6c039367bd1660bc543e5e66caeda92e7c93ff0578bec7be2b5c8230e7efd20e
-
Filesize
158B
MD57e6c0e6fa8a4443c65def2776a98243d
SHA11c6ac2aa26363ed4daf5ad0e714616ab659992ea
SHA256b4a92164e46a44b1d6b96cd1318821ec841a25e3450317fbf7fcae820e2fad18
SHA51282996509611194d0f893b5f6507a4d34fe1968ec92cf760e5f130d32b8aadf78eca7eab77cc0cb665af6a8d79b47fe2704dd0f82d7cfd145e00ea1f088fe4752
-
Filesize
63KB
MD5c8b877cb0d39bd95d7069f5b4c23612a
SHA15fb64bfb87b525c12d424baeb3128ddcde85a4de
SHA256a2026da11259eef54d6162eafef538d915895fcd42d42dae5d0c65c975c07145
SHA5120b1fb239a7eaad73e9d965e5ffa9b8ad0ebf44e5e799ffb0570eafa4c4895d936619321bf577d89ff6c31b338854d667fafc8317bfea40c7f9a7d6fe397bcab0