Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 07:24
Behavioral task
behavioral1
Sample
Notepad.exe
Resource
win7-20240903-en
General
-
Target
Notepad.exe
-
Size
176KB
-
MD5
e811a2eea76cc805e26501c13ce781e4
-
SHA1
9588e37dbdaf367882202067b56a8b89550f16f4
-
SHA256
04f2eadb4cf1c2aa1748467be02e801bb3236d0b1cb4ee22edb01eb12abe0dd3
-
SHA512
a4d58e513d00543767d37a571e5f4a5b923a72d7963cc65f138c28c580854fc74a9e3fdad08102b2630f0ded48be01446132477c4ec211848bd9f201f692ccaf
-
SSDEEP
3072:LuLMTwip2wiMf3bjww24LZGjXpoGoByXPQs2UTXQ8yb7aFcUiSIvF68fJvx:LuLCs/E3bQ4ZGbpYByPT7lyvIcdSIvFX
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
2MadfT525Jmp
-
delay
3
-
install
true
-
install_file
epicgames.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca1-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Notepad.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 epicgames.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epicgames.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4092 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe 2684 Notepad.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 Notepad.exe Token: SeDebugPrivilege 4988 epicgames.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2684 wrote to memory of 772 2684 Notepad.exe 86 PID 2684 wrote to memory of 772 2684 Notepad.exe 86 PID 2684 wrote to memory of 772 2684 Notepad.exe 86 PID 2684 wrote to memory of 2344 2684 Notepad.exe 88 PID 2684 wrote to memory of 2344 2684 Notepad.exe 88 PID 2684 wrote to memory of 2344 2684 Notepad.exe 88 PID 772 wrote to memory of 4484 772 cmd.exe 90 PID 772 wrote to memory of 4484 772 cmd.exe 90 PID 772 wrote to memory of 4484 772 cmd.exe 90 PID 2344 wrote to memory of 4092 2344 cmd.exe 91 PID 2344 wrote to memory of 4092 2344 cmd.exe 91 PID 2344 wrote to memory of 4092 2344 cmd.exe 91 PID 2344 wrote to memory of 4988 2344 cmd.exe 97 PID 2344 wrote to memory of 4988 2344 cmd.exe 97 PID 2344 wrote to memory of 4988 2344 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "epicgames" /tr '"C:\Users\Admin\AppData\Roaming\epicgames.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "epicgames" /tr '"C:\Users\Admin\AppData\Roaming\epicgames.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDA72.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4092
-
-
C:\Users\Admin\AppData\Roaming\epicgames.exe"C:\Users\Admin\AppData\Roaming\epicgames.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5782e0c0137851739d718957809eeabd5
SHA1bd0839c49b256d3eca4db94212e07906ada1f60f
SHA2569a9b488746162fed7b32f9cd4f29952513801fe237eca798e03e4c2b980790b9
SHA5127408d98541d3edba8aa4821f90042ca7754a9c3e75835e0119e94a3e1954ade368baaa20100a289740cd64bb3e30336f8c272adedc7dd978f2f9721db03d93f1
-
Filesize
176KB
MD5e811a2eea76cc805e26501c13ce781e4
SHA19588e37dbdaf367882202067b56a8b89550f16f4
SHA25604f2eadb4cf1c2aa1748467be02e801bb3236d0b1cb4ee22edb01eb12abe0dd3
SHA512a4d58e513d00543767d37a571e5f4a5b923a72d7963cc65f138c28c580854fc74a9e3fdad08102b2630f0ded48be01446132477c4ec211848bd9f201f692ccaf