Analysis
-
max time kernel
32s -
max time network
23s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 02:20
General
-
Target
now.exe
-
Size
63KB
-
MD5
742a8c6a17671e7db3e4fa1c15534fb1
-
SHA1
5f6e4b10c34e512cd1110b6c67b0722d00d5a34d
-
SHA256
6a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
-
SHA512
315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442
-
SSDEEP
1536:DZmttUdjLAQBae5Q5uEPGbbQwTPVbGBi/J6GVZVclN:DZmttUdjvBF5Qw2GbbQ6dzY
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:64431
fojeweb571-64431.portmap.host:8848
fojeweb571-64431.portmap.host:64431
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002ab87-10.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2568 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3392 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe 928 now.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 928 now.exe Token: SeDebugPrivilege 2568 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 928 wrote to memory of 3088 928 now.exe 78 PID 928 wrote to memory of 3088 928 now.exe 78 PID 928 wrote to memory of 4508 928 now.exe 80 PID 928 wrote to memory of 4508 928 now.exe 80 PID 4508 wrote to memory of 3392 4508 cmd.exe 82 PID 4508 wrote to memory of 3392 4508 cmd.exe 82 PID 3088 wrote to memory of 1340 3088 cmd.exe 83 PID 3088 wrote to memory of 1340 3088 cmd.exe 83 PID 4508 wrote to memory of 2568 4508 cmd.exe 84 PID 4508 wrote to memory of 2568 4508 cmd.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\now.exe"C:\Users\Admin\AppData\Local\Temp\now.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp762A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3392
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5beb0effdd0c3732ef76c8a4d194de806
SHA13599c3a3b88343280c638558f68a263f47fe7a58
SHA256c9a52dca809a9802551515534b211fb6e96587e9aa5255b887e7a4d445cbe405
SHA5124a66974b668ee9b29119e2b1fc3a45bd4aeb0164045fdeaba527355fa64a474a00cf45b1dc8168e13978657c46007a22aa94ab068efcacb886ea112d00a324a8
-
Filesize
63KB
MD5742a8c6a17671e7db3e4fa1c15534fb1
SHA15f6e4b10c34e512cd1110b6c67b0722d00d5a34d
SHA2566a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
SHA512315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442