Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe
Resource
win7-20241010-en
General
-
Target
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe
-
Size
1.1MB
-
MD5
27f646f3b6591f9f7df3fa65d0b2e2f3
-
SHA1
92d089ea1704882148c68447c94a4cc76760d8cb
-
SHA256
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b
-
SHA512
54279545b48e98dd37f1fcb960ccc00fc4e1a41947da49d34ee63b7ff1a834b55169419c4e4c0a29295bf40e92df2cc55037053bfbe7553978caac932d118101
-
SSDEEP
24576:waZwl60+T/zNewASB8qKX2nyoIDQ2PPTcONWpDey7iI6AWlhA+D2OWygEFA+iL2+:WaT/zvAStyoIDQ2PPTcONWpDey7iIXWA
Malware Config
Extracted
asyncrat
1.0.7
NOV19
notificacionpdf.duckdns.org:8010
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
| Edit 3LOSH RAT
Default
oooptesg.duckdns.org:8020
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
njrat
0.7.3
Lime
gfhgfjfrur.duckdns.org:8031
Client.exe
-
reg_key
Client.exe
-
splitter
1234
Signatures
-
Asyncrat family
-
Njrat family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExplrerEnglishLanguage = "C:\\Users\\Admin\\Pictures\\EnglishExplorer\\Bin\\ExplorerEnglish.exe" b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.execsc.exedescription pid Process procid_target PID 3940 set thread context of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 4980 set thread context of 4464 4980 csc.exe 100 PID 4980 set thread context of 5028 4980 csc.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.execsc.exeRegSvcs.exeRegSvcs.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
csc.exeRegSvcs.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 4980 csc.exe Token: SeDebugPrivilege 4464 RegSvcs.exe Token: SeDebugPrivilege 5028 RegSvcs.exe Token: 33 5028 RegSvcs.exe Token: SeIncBasePriorityPrivilege 5028 RegSvcs.exe Token: 33 5028 RegSvcs.exe Token: SeIncBasePriorityPrivilege 5028 RegSvcs.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.execsc.exedescription pid Process procid_target PID 3940 wrote to memory of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 3940 wrote to memory of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 3940 wrote to memory of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 3940 wrote to memory of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 3940 wrote to memory of 4980 3940 b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe 91 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 4464 4980 csc.exe 100 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102 PID 4980 wrote to memory of 5028 4980 csc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe"C:\Users\Admin\AppData\Local\Temp\b61d9cae70fcb7e27d7a95718dbf0bd8f2d8794d9e35adfeb6d6a61305561c6b.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-