Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 10:14
Behavioral task
behavioral1
Sample
fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe
Resource
win7-20240903-en
General
-
Target
fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe
-
Size
63KB
-
MD5
aba726ec9183c855cfa084ee66f49f7f
-
SHA1
f12f9cf0920b0d3a76bb16027539ba0c13da035d
-
SHA256
fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71
-
SHA512
a03a1c596e9570c6766d051d76e1a14894852cfa3889dd567f9e187be1055a49479355b8ed3a876a2934308aac945b232c1b206664614b66791ed0cc1f0b5c1f
-
SSDEEP
1536:NX9rsr4iD7jhBYUbghiLRmuhidpqKmY7:Vh44E77YUbgPGz
Malware Config
Extracted
asyncrat
Default
one-accordance.gl.at.ply.gg:9590
-
delay
1
-
install
true
-
install_file
Windows Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2788 Windows Defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2636 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe 2788 Windows Defender.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe Token: SeDebugPrivilege 2788 Windows Defender.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2552 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 29 PID 1660 wrote to memory of 2552 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 29 PID 1660 wrote to memory of 2552 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 29 PID 1660 wrote to memory of 2556 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 31 PID 1660 wrote to memory of 2556 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 31 PID 1660 wrote to memory of 2556 1660 fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe 31 PID 2552 wrote to memory of 2972 2552 cmd.exe 33 PID 2552 wrote to memory of 2972 2552 cmd.exe 33 PID 2552 wrote to memory of 2972 2552 cmd.exe 33 PID 2556 wrote to memory of 2636 2556 cmd.exe 34 PID 2556 wrote to memory of 2636 2556 cmd.exe 34 PID 2556 wrote to memory of 2636 2556 cmd.exe 34 PID 2556 wrote to memory of 2788 2556 cmd.exe 35 PID 2556 wrote to memory of 2788 2556 cmd.exe 35 PID 2556 wrote to memory of 2788 2556 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe"C:\Users\Admin\AppData\Local\Temp\fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Defender" /tr '"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Defender" /tr '"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpFD24.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD570b69e1d38be3a43dca6c6634c22a844
SHA1a014380dc472f487263278010684e8a5a1d5943a
SHA256d06365a17eb79b64201b3c862748d94af25ae8be5f1a5663c0278ac7e5c7e715
SHA5123e7e1fc45e4fed2d66970006db3155d642a898839163e1c97f91d6bba4f0d061328e94956b197e5ab998379ce4a58da12b313aea042dd2f945c465f435d3b26b
-
Filesize
63KB
MD5aba726ec9183c855cfa084ee66f49f7f
SHA1f12f9cf0920b0d3a76bb16027539ba0c13da035d
SHA256fb680425e6edc0fa4d2fe526cd78d6ec69683fcafe57744993c8b7192b2c0a71
SHA512a03a1c596e9570c6766d051d76e1a14894852cfa3889dd567f9e187be1055a49479355b8ed3a876a2934308aac945b232c1b206664614b66791ed0cc1f0b5c1f