Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 23:30
Behavioral task
behavioral1
Sample
Rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Rat.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Rat.exe
-
Size
45KB
-
MD5
45ce089045a1c4294dc9ad3722d29465
-
SHA1
d63e1ab062687aeab1d3d6a6709cf62b8b477c4d
-
SHA256
a5a58916499663c7377b89b29964883fa3253c177f66d1ea2f337432bc44e49c
-
SHA512
95219fb29535db52c3205f5fa28eb3a54e97b7dec9ad7768eade89255ec68d494a82da849efc68d2484b06f2075c305dd494fc01c2e00eedc75717c10e051dcb
-
SSDEEP
768:Oug1NTjgkH7F7WUHF9pmo2q7OUnZOEIs6JPIazjb1gX3pbPGr25siWBDZex:Oug1NTcIb2dSt/6ma3bSXZTVN4dex
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
81.79.156.77:6606
81.79.156.77:7707
81.79.156.77:8808
FW2Ok6cukTID
-
delay
3
-
install
true
-
install_file
Discord.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000023b60-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Rat.exe -
Executes dropped EXE 1 IoCs
pid Process 3148 Discord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4748 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe 392 Rat.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 Rat.exe Token: SeDebugPrivilege 3148 Discord.exe Token: SeDebugPrivilege 3148 Discord.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 392 wrote to memory of 2056 392 Rat.exe 86 PID 392 wrote to memory of 2056 392 Rat.exe 86 PID 392 wrote to memory of 2056 392 Rat.exe 86 PID 392 wrote to memory of 1196 392 Rat.exe 88 PID 392 wrote to memory of 1196 392 Rat.exe 88 PID 392 wrote to memory of 1196 392 Rat.exe 88 PID 2056 wrote to memory of 4488 2056 cmd.exe 90 PID 2056 wrote to memory of 4488 2056 cmd.exe 90 PID 2056 wrote to memory of 4488 2056 cmd.exe 90 PID 1196 wrote to memory of 4748 1196 cmd.exe 91 PID 1196 wrote to memory of 4748 1196 cmd.exe 91 PID 1196 wrote to memory of 4748 1196 cmd.exe 91 PID 1196 wrote to memory of 3148 1196 cmd.exe 92 PID 1196 wrote to memory of 3148 1196 cmd.exe 92 PID 1196 wrote to memory of 3148 1196 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rat.exe"C:\Users\Admin\AppData\Local\Temp\Rat.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Local\Temp\Discord.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Local\Temp\Discord.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp855C.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Discord.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD545ce089045a1c4294dc9ad3722d29465
SHA1d63e1ab062687aeab1d3d6a6709cf62b8b477c4d
SHA256a5a58916499663c7377b89b29964883fa3253c177f66d1ea2f337432bc44e49c
SHA51295219fb29535db52c3205f5fa28eb3a54e97b7dec9ad7768eade89255ec68d494a82da849efc68d2484b06f2075c305dd494fc01c2e00eedc75717c10e051dcb
-
Filesize
154B
MD5561e4f9bd9f7197724faa981947271df
SHA1068c59ad288871bd019884db977d5d4eb461f750
SHA2569e4fb80b9496114c788ee4b2c8e57fa46c2c0c6caf187ec2ff7b3b674d851116
SHA5126dcfc59a6fb807043d20ae886161ba94b1b7d48755e422387ad25a7a0ecde14c5cdb25c177df6dee60abdacb1d3e3234ad97447b8b908cd1fd49d03b2748e90e