Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe
-
Size
1.2MB
-
MD5
0841d5feacdedbb69053d11dd55db16e
-
SHA1
bf0d19adec40e2bae9a23712811704c3f93eac10
-
SHA256
a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c
-
SHA512
95363a965835ca1a20bce0126c1c7f31219550d1c027355f841fdd359d0ef838496f5faff99f3706a546482013feaf2c6324f45246ba9118204143417d44ef8a
-
SSDEEP
24576:B/3X77uS/bDqWASwX2OpgSEhCgGlEb6zl7OXP3+CJZQxKIF7U+tXZ:B/3XPLXq7SIgB1P6NF7VX
Malware Config
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ArgCount.vbs a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5088 set thread context of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe Token: SeDebugPrivilege 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe Token: SeDebugPrivilege 1524 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100 PID 5088 wrote to memory of 1524 5088 a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe"C:\Users\Admin\AppData\Local\Temp\a87c8cf8a1169689cb55e2184119bb021974842c8e38355dd3cf830fc98ae98c.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1524
-