Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:52
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
546e8a050d385832d9476fdaa390a0cb
-
SHA1
b40491436bcef5b049a1b9cb09c1aad8de416982
-
SHA256
ecc7506168f6a09bc086a63587b3f5ec3ff9aca0695e7a7db16c045c4a1aefa5
-
SHA512
2e816cc3cecb80faeb118b72e1048989108b06f70ef5b86800ba3c059c7679d9b3bab7d73be9c47cad63403e7fe3b1456cf1e8f1cafd4dce8a72aeebc120212e
-
SSDEEP
768:yuPfZTg4pYiWUU9jjmo2qrYKjPGaG6PIyzjbFgX3iy2EWnd/umZZBDZqx:yuPfZTgKa2BKTkDy3bCXSy2FcQdqx
Malware Config
Extracted
asyncrat
0.5.8
Default
community-married.gl.at.ply.gg:14614
Z4k5N44Yf8xU
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AsyncClient.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
taskmgr.exepid process 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4644 taskmgr.exe Token: SeSystemProfilePrivilege 4644 taskmgr.exe Token: SeCreateGlobalPrivilege 4644 taskmgr.exe Token: 33 4644 taskmgr.exe Token: SeIncBasePriorityPrivilege 4644 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
taskmgr.exepid process 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
taskmgr.exepid process 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe 4644 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2272
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4644