Analysis
-
max time kernel
51s -
max time network
47s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-12-2024 23:30
Behavioral task
behavioral1
Sample
Rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Rat.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Rat.exe
-
Size
45KB
-
MD5
45ce089045a1c4294dc9ad3722d29465
-
SHA1
d63e1ab062687aeab1d3d6a6709cf62b8b477c4d
-
SHA256
a5a58916499663c7377b89b29964883fa3253c177f66d1ea2f337432bc44e49c
-
SHA512
95219fb29535db52c3205f5fa28eb3a54e97b7dec9ad7768eade89255ec68d494a82da849efc68d2484b06f2075c305dd494fc01c2e00eedc75717c10e051dcb
-
SSDEEP
768:Oug1NTjgkH7F7WUHF9pmo2q7OUnZOEIs6JPIazjb1gX3pbPGr25siWBDZex:Oug1NTcIb2dSt/6ma3bSXZTVN4dex
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
81.79.156.77:6606
81.79.156.77:7707
81.79.156.77:8808
FW2Ok6cukTID
-
delay
3
-
install
true
-
install_file
Discord.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral3/files/0x001a00000002ab80-12.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 5476 Discord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3652 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe 5240 Rat.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5240 Rat.exe Token: SeDebugPrivilege 5476 Discord.exe Token: SeDebugPrivilege 5476 Discord.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5240 wrote to memory of 5684 5240 Rat.exe 79 PID 5240 wrote to memory of 5684 5240 Rat.exe 79 PID 5240 wrote to memory of 5684 5240 Rat.exe 79 PID 5240 wrote to memory of 6056 5240 Rat.exe 81 PID 5240 wrote to memory of 6056 5240 Rat.exe 81 PID 5240 wrote to memory of 6056 5240 Rat.exe 81 PID 5684 wrote to memory of 5728 5684 cmd.exe 83 PID 5684 wrote to memory of 5728 5684 cmd.exe 83 PID 5684 wrote to memory of 5728 5684 cmd.exe 83 PID 6056 wrote to memory of 3652 6056 cmd.exe 84 PID 6056 wrote to memory of 3652 6056 cmd.exe 84 PID 6056 wrote to memory of 3652 6056 cmd.exe 84 PID 6056 wrote to memory of 5476 6056 cmd.exe 85 PID 6056 wrote to memory of 5476 6056 cmd.exe 85 PID 6056 wrote to memory of 5476 6056 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rat.exe"C:\Users\Admin\AppData\Local\Temp\Rat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Local\Temp\Discord.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5684 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Local\Temp\Discord.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA846.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Discord.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD545ce089045a1c4294dc9ad3722d29465
SHA1d63e1ab062687aeab1d3d6a6709cf62b8b477c4d
SHA256a5a58916499663c7377b89b29964883fa3253c177f66d1ea2f337432bc44e49c
SHA51295219fb29535db52c3205f5fa28eb3a54e97b7dec9ad7768eade89255ec68d494a82da849efc68d2484b06f2075c305dd494fc01c2e00eedc75717c10e051dcb
-
Filesize
154B
MD5fee14b179b5884bdeade373b156bea6a
SHA1ca40ef80332356915ec519c5cac89dad66ef3ed6
SHA25606202b29a8ff6901eb0643a2567b495178a2da0ab4240e3ca8f1343be4063a80
SHA5120da5cff0ecbc193fec68d98478e0ded1a8722b1a72d3bc963e4fae8ad947ba5217a9068138f11589b4f5cc74aafb4a5c833c7204588a7d0aabf98240a77c7d14