Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 14:45
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20241010-en
General
-
Target
3.exe
-
Size
48KB
-
MD5
3d9e11f133404b0de3f4fd7e375e3fbf
-
SHA1
1da48c172f95eb337a3b3427f6360d112abf907e
-
SHA256
929bd74e00c56ec0935d5390a89dd4942abc1f3511a267034739fff0491e350b
-
SHA512
77aa948b664f957851bb33d2276df7315d5f05abe912bed1214f6e37270a525799fb04cacd0e17a6c07fff55f96a32222ecf71fcf2104e71de153c64de8f147c
-
SSDEEP
768:eVVFxILHtFp+BirI7Vf2ki6Y8Yb4gepge+6BvEgK/JYZVc6KN:eV27Eorzbvt6BnkJYZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:52039
dfsgmnhsrf23456623423456-52039.portmap.host:8848
dfsgmnhsrf23456623423456-52039.portmap.host:52039
DcRatMutex_qwqdanchunxinsfd,mhbm gdfvg
-
delay
1
-
install
true
-
install_file
windows defender firewall required.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001f00000002aabb-10.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2032 windows defender firewall required.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 672 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4160 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2068 3.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2068 3.exe Token: SeDebugPrivilege 2032 windows defender firewall required.exe Token: SeDebugPrivilege 2184 taskmgr.exe Token: SeSystemProfilePrivilege 2184 taskmgr.exe Token: SeCreateGlobalPrivilege 2184 taskmgr.exe Token: 33 2184 taskmgr.exe Token: SeIncBasePriorityPrivilege 2184 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe 2184 taskmgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3784 2068 3.exe 77 PID 2068 wrote to memory of 3784 2068 3.exe 77 PID 2068 wrote to memory of 1984 2068 3.exe 79 PID 2068 wrote to memory of 1984 2068 3.exe 79 PID 3784 wrote to memory of 4160 3784 cmd.exe 81 PID 3784 wrote to memory of 4160 3784 cmd.exe 81 PID 1984 wrote to memory of 672 1984 cmd.exe 82 PID 1984 wrote to memory of 672 1984 cmd.exe 82 PID 1984 wrote to memory of 2032 1984 cmd.exe 83 PID 1984 wrote to memory of 2032 1984 cmd.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall required" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall required" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:672
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178B
MD51de42997fe317ff278d4253f1b92ece9
SHA17e994ebe11770e5b1c06cbf4a308481188a0ae83
SHA256da08d515ec8cc201b185c2b1f59f305dbe994a517d8b9134ebd792603da3a620
SHA512015aff12d663ed2a69713b1a8c63929923da3d46268676626dc53e9c262fee2037bb8537b78d326d56056c8c387c85d715278c542d7dd7ecbe4c4e774cc1d277
-
Filesize
48KB
MD53d9e11f133404b0de3f4fd7e375e3fbf
SHA11da48c172f95eb337a3b3427f6360d112abf907e
SHA256929bd74e00c56ec0935d5390a89dd4942abc1f3511a267034739fff0491e350b
SHA51277aa948b664f957851bb33d2276df7315d5f05abe912bed1214f6e37270a525799fb04cacd0e17a6c07fff55f96a32222ecf71fcf2104e71de153c64de8f147c