Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 11:49
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240708-en
General
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
678c7b99496c1e045a6f8a7072f41902
-
SHA1
fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de
-
SHA256
b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd
-
SHA512
ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6
-
SSDEEP
768:QuYH9T3kH1jWUvTqRmo2qbcrFgnNyGzYk5PIqPESVOs0bXbva5XPfG1tRulaADVg:QuYH9T34y2nFg7X2qPJEbDatPfG1tRue
Malware Config
Extracted
asyncrat
0.5.8
Default
juGfnQMxS4Ze
-
delay
3
-
install
true
-
install_file
Sync.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/s14cUU5G
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Sync.exe family_asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Sync.exepid process 2796 Sync.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2356 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
timeout.exeSync.exeAsyncClient.execmd.execmd.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2780 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
AsyncClient.exepid process 2568 AsyncClient.exe 2568 AsyncClient.exe 2568 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AsyncClient.exeSync.exedescription pid process Token: SeDebugPrivilege 2568 AsyncClient.exe Token: SeDebugPrivilege 2796 Sync.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
AsyncClient.execmd.execmd.exedescription pid process target process PID 2568 wrote to memory of 1704 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 1704 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 1704 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 1704 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 2356 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 2356 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 2356 2568 AsyncClient.exe cmd.exe PID 2568 wrote to memory of 2356 2568 AsyncClient.exe cmd.exe PID 1704 wrote to memory of 2884 1704 cmd.exe schtasks.exe PID 1704 wrote to memory of 2884 1704 cmd.exe schtasks.exe PID 1704 wrote to memory of 2884 1704 cmd.exe schtasks.exe PID 1704 wrote to memory of 2884 1704 cmd.exe schtasks.exe PID 2356 wrote to memory of 2780 2356 cmd.exe timeout.exe PID 2356 wrote to memory of 2780 2356 cmd.exe timeout.exe PID 2356 wrote to memory of 2780 2356 cmd.exe timeout.exe PID 2356 wrote to memory of 2780 2356 cmd.exe timeout.exe PID 2356 wrote to memory of 2796 2356 cmd.exe Sync.exe PID 2356 wrote to memory of 2796 2356 cmd.exe Sync.exe PID 2356 wrote to memory of 2796 2356 cmd.exe Sync.exe PID 2356 wrote to memory of 2796 2356 cmd.exe Sync.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Sync" /tr '"C:\Users\Admin\AppData\Roaming\Sync.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Sync" /tr '"C:\Users\Admin\AppData\Roaming\Sync.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC17B.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2780
-
-
C:\Users\Admin\AppData\Roaming\Sync.exe"C:\Users\Admin\AppData\Roaming\Sync.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD50d5a2d1cd74fb74bef0cdb8864a95eef
SHA15823f637e0102fd8ed334fe8855cbc0db3e85dca
SHA2566e52962c986ae08791fb8f51ba759f9602fbca05e07cad18a0d7cdfcc054c65e
SHA512c55415b06d75b57c0e4218b4a971f39602ce468b27148413705035b5176e9aa47c47ca857ee87dbfef8fcc51b690df10ed65567761363f51f4163c6c75b749a5
-
Filesize
47KB
MD5678c7b99496c1e045a6f8a7072f41902
SHA1fbc4bf034a1d4b0b7f0777da3dbf63ba2ea7d5de
SHA256b89c64e6cb8ac56910849b3340322f3ed1aa77be3aee2a9e081ff08819ce43bd
SHA512ac152cb621f2503178f82dfca62816cb13c91551c3f0c181c245117b3a1e2d9dbe022dce109f8e192d74e31c251a857770974f03c5f2b528017fe66e79195fc6