Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 12:40
Behavioral task
behavioral1
Sample
eeeeeeeeeeeeeeeeeeeee.exe
Resource
win7-20240903-en
General
-
Target
eeeeeeeeeeeeeeeeeeeee.exe
-
Size
47KB
-
MD5
70dea4658bea5bf00ef8c0578693d6fa
-
SHA1
814cf65c3cc2394a8a2bab4997f28c46f1976e41
-
SHA256
85a8267c923fccae9397ee2f05dead67d8877145b175f6836940a28fa96ca4ae
-
SHA512
348990ee46dc1d19b7a697b81949b22dbca9af203d9ba2cb06036f82cace988b160a3a45193abf67f014ea2c44db9c4540771c8d4f179f9991cf8754ec563e39
-
SSDEEP
768:gusPr1TUq7qMFPWUDVGotmo2qzY5HCdS7eU/t+PIG+BXqm0b6nu4tqCy1cftNBDc:gusj1TUfMso2VJT7vtHGK8b6nltWcfRY
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:80
wpqzdX1ij9YS
-
delay
3
-
install
true
-
install_file
aa.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000018731-14.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2800 aa.exe -
Loads dropped DLL 1 IoCs
pid Process 1900 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeeeeeeeeeeeeeeeeeeee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2092 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3052 eeeeeeeeeeeeeeeeeeeee.exe 3052 eeeeeeeeeeeeeeeeeeeee.exe 3052 eeeeeeeeeeeeeeeeeeeee.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3052 eeeeeeeeeeeeeeeeeeeee.exe Token: SeDebugPrivilege 2800 aa.exe Token: SeDebugPrivilege 2800 aa.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2396 3052 eeeeeeeeeeeeeeeeeeeee.exe 31 PID 3052 wrote to memory of 2396 3052 eeeeeeeeeeeeeeeeeeeee.exe 31 PID 3052 wrote to memory of 2396 3052 eeeeeeeeeeeeeeeeeeeee.exe 31 PID 3052 wrote to memory of 2396 3052 eeeeeeeeeeeeeeeeeeeee.exe 31 PID 3052 wrote to memory of 1900 3052 eeeeeeeeeeeeeeeeeeeee.exe 33 PID 3052 wrote to memory of 1900 3052 eeeeeeeeeeeeeeeeeeeee.exe 33 PID 3052 wrote to memory of 1900 3052 eeeeeeeeeeeeeeeeeeeee.exe 33 PID 3052 wrote to memory of 1900 3052 eeeeeeeeeeeeeeeeeeeee.exe 33 PID 2396 wrote to memory of 484 2396 cmd.exe 35 PID 2396 wrote to memory of 484 2396 cmd.exe 35 PID 2396 wrote to memory of 484 2396 cmd.exe 35 PID 2396 wrote to memory of 484 2396 cmd.exe 35 PID 1900 wrote to memory of 2092 1900 cmd.exe 36 PID 1900 wrote to memory of 2092 1900 cmd.exe 36 PID 1900 wrote to memory of 2092 1900 cmd.exe 36 PID 1900 wrote to memory of 2092 1900 cmd.exe 36 PID 1900 wrote to memory of 2800 1900 cmd.exe 37 PID 1900 wrote to memory of 2800 1900 cmd.exe 37 PID 1900 wrote to memory of 2800 1900 cmd.exe 37 PID 1900 wrote to memory of 2800 1900 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeeeeeeeeee.exe"C:\Users\Admin\AppData\Local\Temp\eeeeeeeeeeeeeeeeeeeee.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "aa" /tr '"C:\Users\Admin\AppData\Roaming\aa.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "aa" /tr '"C:\Users\Admin\AppData\Roaming\aa.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC957.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\aa.exe"C:\Users\Admin\AppData\Roaming\aa.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD5e01055bc6c9b5cc5e5fdb4e44c7bf1a0
SHA1d3db1ef46744315bb0127f2dcfb76c63fa00e171
SHA256fa5c31839bcbeec1197211477da019a1d7a05327b57cfcab23c5f51f00888a86
SHA51209ac464d82ef95f5837d0d28316bf1f5a814dfcdf324029feb598b15d44ed2dd8488c1c30937c24df4141d2e283af49a236a123da24dd8f7a4762dc06e01db66
-
Filesize
47KB
MD570dea4658bea5bf00ef8c0578693d6fa
SHA1814cf65c3cc2394a8a2bab4997f28c46f1976e41
SHA25685a8267c923fccae9397ee2f05dead67d8877145b175f6836940a28fa96ca4ae
SHA512348990ee46dc1d19b7a697b81949b22dbca9af203d9ba2cb06036f82cace988b160a3a45193abf67f014ea2c44db9c4540771c8d4f179f9991cf8754ec563e39