Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 12:57
General
-
Target
1.exe
-
Size
63KB
-
MD5
cf90a4de10e208d956569255917251fa
-
SHA1
1002b35498b701bb9542aed54c77bc4e66a953ba
-
SHA256
c03f149cdbbcb2c095f92061cecff35bdbde6b3700cfa75ef0e5b12e9929c3bf
-
SHA512
abcb7bc570d5e31478a2e05b9d1c95b8ea076b1d4d7ce370c781ba0879a6ba9fcbc828d4a12ed8ece8751e8457e0351a3a6807301a5b6fe41d4118ffdf8a7cb6
-
SSDEEP
1536:fJxFz3FI8Cwof4wJK7bkyyiNXGbbrwrcqmnGBZVclN:fJxFz3FI8Cwo7JK7bky/JGbbrmDzY
Malware Config
Extracted
asyncrat
1.0.7
Default
fojeweb571-45302.portmap.host:45302
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb1-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4056 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe 3256 1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3256 1.exe Token: SeDebugPrivilege 5116 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3256 wrote to memory of 3264 3256 1.exe 83 PID 3256 wrote to memory of 3264 3256 1.exe 83 PID 3256 wrote to memory of 3384 3256 1.exe 84 PID 3256 wrote to memory of 3384 3256 1.exe 84 PID 3264 wrote to memory of 1392 3264 cmd.exe 87 PID 3264 wrote to memory of 1392 3264 cmd.exe 87 PID 3384 wrote to memory of 4056 3384 cmd.exe 88 PID 3384 wrote to memory of 4056 3384 cmd.exe 88 PID 3384 wrote to memory of 5116 3384 cmd.exe 89 PID 3384 wrote to memory of 5116 3384 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9FAB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4056
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5acb8b71fa1de38fde107c86d6500b8ca
SHA1af65f994b546aa58b8aebb5e97dd1954e04a878d
SHA25663ef0590924399ebecf6d20cee79abd82c8e7d25fad98bc076a86a26201b40f8
SHA512d0d35cf3eb27430053287545720aa8586fe56918adc4b17e09503da11db00a5eeaaaff36f1cffd7e5d61a1a600412f45c87a4478b16e920b69afd3edb42a03ca
-
Filesize
63KB
MD5cf90a4de10e208d956569255917251fa
SHA11002b35498b701bb9542aed54c77bc4e66a953ba
SHA256c03f149cdbbcb2c095f92061cecff35bdbde6b3700cfa75ef0e5b12e9929c3bf
SHA512abcb7bc570d5e31478a2e05b9d1c95b8ea076b1d4d7ce370c781ba0879a6ba9fcbc828d4a12ed8ece8751e8457e0351a3a6807301a5b6fe41d4118ffdf8a7cb6