Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
qtIh.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
qtIh.exe
Resource
win10v2004-20241007-en
General
-
Target
qtIh.exe
-
Size
1.9MB
-
MD5
18a531099ef85a846a63b7aee12b45e7
-
SHA1
ccee12b82ebc5585febac7929312ee3024821db9
-
SHA256
aa2865178dc691edfdfc676c77a638cd165cbe9385a0ae4b8bfa16e9b9af753b
-
SHA512
81b9b18a24882d5b2f2704f20df57719290da063dac8147e866e076d7a1591e379309dfd780a546a739688d30c5ee51f9e5599d6576a7ddd09286f10324e5ab9
-
SSDEEP
49152:69U35JCirYhIntmZrbQhrHqxZrbQhrHq26R5vIk:6O3vTtmZrbQhrHqxZrbQhrHq357
Malware Config
Extracted
asyncrat
1.0.7
chile
formationslistcomplet2.sexidude.com:4365
ueyroowiieyyriowowieuuurueiwiwur
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UniFab = "C:\\Users\\Admin\\Documents\\UniFab\\Bin\\UniFab.exe" qtIh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5096 set thread context of 2324 5096 qtIh.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 3096 5096 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtIh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2324 5096 qtIh.exe 87 PID 5096 wrote to memory of 2324 5096 qtIh.exe 87 PID 5096 wrote to memory of 2324 5096 qtIh.exe 87 PID 5096 wrote to memory of 2324 5096 qtIh.exe 87 PID 5096 wrote to memory of 2324 5096 qtIh.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\qtIh.exe"C:\Users\Admin\AppData\Local\Temp\qtIh.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 1402⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5096 -ip 50961⤵PID:336