Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-12-2024 02:25
General
-
Target
now.exe
-
Size
63KB
-
MD5
742a8c6a17671e7db3e4fa1c15534fb1
-
SHA1
5f6e4b10c34e512cd1110b6c67b0722d00d5a34d
-
SHA256
6a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
-
SHA512
315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442
-
SSDEEP
1536:DZmttUdjLAQBae5Q5uEPGbbQwTPVbGBi/J6GVZVclN:DZmttUdjvBF5Qw2GbbQ6dzY
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:64431
fojeweb571-64431.portmap.host:8848
fojeweb571-64431.portmap.host:64431
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0029000000045047-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4074627901-37362009-3519777259-1000\Control Panel\International\Geo\Nation now.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 608 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe 3608 now.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3608 now.exe Token: SeDebugPrivilege 1564 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3608 wrote to memory of 5044 3608 now.exe 82 PID 3608 wrote to memory of 5044 3608 now.exe 82 PID 3608 wrote to memory of 3224 3608 now.exe 84 PID 3608 wrote to memory of 3224 3608 now.exe 84 PID 3224 wrote to memory of 608 3224 cmd.exe 87 PID 3224 wrote to memory of 608 3224 cmd.exe 87 PID 5044 wrote to memory of 4712 5044 cmd.exe 86 PID 5044 wrote to memory of 4712 5044 cmd.exe 86 PID 3224 wrote to memory of 1564 3224 cmd.exe 92 PID 3224 wrote to memory of 1564 3224 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\now.exe"C:\Users\Admin\AppData\Local\Temp\now.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6B6C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:608
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5860ea40a90789f726f643af1ef86f613
SHA17484a02258849522fa6633bad0858b88b70d09d7
SHA256dff485648f0a4f9b2cade5ec470d1e731aa2d95e58aa7d4925b230d9456be9b3
SHA5122dced3f0cb3ce07c4cae365d60c45ceecbb1b9a86b4dc82cbed79d147daf51e5ca3a8c2961926c7061d207429ac29f622ac4778c296606456d229f04090601b5
-
Filesize
63KB
MD5742a8c6a17671e7db3e4fa1c15534fb1
SHA15f6e4b10c34e512cd1110b6c67b0722d00d5a34d
SHA2566a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
SHA512315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442