Analysis
-
max time kernel
96s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 01:40
Behavioral task
behavioral1
Sample
109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe
Resource
win7-20240708-en
General
-
Target
109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe
-
Size
63KB
-
MD5
6c7adc2f28f40d79c09fdd2d59a94ab0
-
SHA1
48c3f3223376146c61a00c948447c188147c5dae
-
SHA256
109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6
-
SHA512
d3db6d8ec0835540299c0faf35d87327090d36b6fa3fd14fc26a452bdb7c084093d2424238ee0e2b847d07c33cb871f7cf5cd428226b08e1fc317ed88259a4a6
-
SSDEEP
1536:YhahLzRQA+dsHbp0G8QOjeUJyq8wJGbbqwXGazpqKmY7:YhahLzRQA+dsHbp0AOjeUw8Gbbqwwz
Malware Config
Extracted
asyncrat
1.0.7
Default
31.57.135.113:4199
w5g64wefd5w4ef
-
delay
1
-
install
true
-
install_file
dllhost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b4a-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe -
Executes dropped EXE 1 IoCs
pid Process 884 dllhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4536 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe Token: SeDebugPrivilege 884 dllhost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3140 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 82 PID 3212 wrote to memory of 3140 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 82 PID 3212 wrote to memory of 4032 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 84 PID 3212 wrote to memory of 4032 3212 109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe 84 PID 4032 wrote to memory of 4536 4032 cmd.exe 87 PID 4032 wrote to memory of 4536 4032 cmd.exe 87 PID 3140 wrote to memory of 2772 3140 cmd.exe 86 PID 3140 wrote to memory of 2772 3140 cmd.exe 86 PID 4032 wrote to memory of 884 4032 cmd.exe 88 PID 4032 wrote to memory of 884 4032 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe"C:\Users\Admin\AppData\Local\Temp\109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6N.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "dllhost" /tr '"C:\Users\Admin\AppData\Roaming\dllhost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "dllhost" /tr '"C:\Users\Admin\AppData\Roaming\dllhost.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp87BE.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4536
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD55fdb4db0a6c58f4beca2e81e3efd18d0
SHA1c1b6e53ac321836b0422f6741c2adf2e802f0ed1
SHA2565d6114e3f58b67e561a8e119c0789e6a06fa9715688dc684f946fa2a7da17f1a
SHA512faafd29605a8e7611b1a617782afd4678620889dd0f3a04e1cb53ee5417bf6d7a30bf1422fd1fcba96888b5aef4366d8851e581fbdd3ef57154cbfb913c67a3a
-
Filesize
63KB
MD56c7adc2f28f40d79c09fdd2d59a94ab0
SHA148c3f3223376146c61a00c948447c188147c5dae
SHA256109c3b63306fcc197268155a8f45681e14987eb207d4b8eef74978cf5a4114e6
SHA512d3db6d8ec0835540299c0faf35d87327090d36b6fa3fd14fc26a452bdb7c084093d2424238ee0e2b847d07c33cb871f7cf5cd428226b08e1fc317ed88259a4a6