Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 14:44
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3.exe
Resource
win10v2004-20241007-en
General
-
Target
3.exe
-
Size
48KB
-
MD5
3d9e11f133404b0de3f4fd7e375e3fbf
-
SHA1
1da48c172f95eb337a3b3427f6360d112abf907e
-
SHA256
929bd74e00c56ec0935d5390a89dd4942abc1f3511a267034739fff0491e350b
-
SHA512
77aa948b664f957851bb33d2276df7315d5f05abe912bed1214f6e37270a525799fb04cacd0e17a6c07fff55f96a32222ecf71fcf2104e71de153c64de8f147c
-
SSDEEP
768:eVVFxILHtFp+BirI7Vf2ki6Y8Yb4gepge+6BvEgK/JYZVc6KN:eV27Eorzbvt6BnkJYZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:52039
dfsgmnhsrf23456623423456-52039.portmap.host:8848
dfsgmnhsrf23456623423456-52039.portmap.host:52039
DcRatMutex_qwqdanchunxinsfd,mhbm gdfvg
-
delay
1
-
install
true
-
install_file
windows defender firewall required.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9b-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 3.exe -
Executes dropped EXE 1 IoCs
pid Process 3488 windows defender firewall required.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2024 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe 3272 3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3272 3.exe Token: SeDebugPrivilege 3488 windows defender firewall required.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2456 3272 3.exe 82 PID 3272 wrote to memory of 2456 3272 3.exe 82 PID 3272 wrote to memory of 4424 3272 3.exe 84 PID 3272 wrote to memory of 4424 3272 3.exe 84 PID 2456 wrote to memory of 2180 2456 cmd.exe 86 PID 2456 wrote to memory of 2180 2456 cmd.exe 86 PID 4424 wrote to memory of 2024 4424 cmd.exe 87 PID 4424 wrote to memory of 2024 4424 cmd.exe 87 PID 4424 wrote to memory of 3488 4424 cmd.exe 88 PID 4424 wrote to memory of 3488 4424 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall required" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall required" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAEED.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2024
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall required.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178B
MD503ca172766c02e63bcd3173ec6e36d3b
SHA142c4cc9627664227ca8ac3cfb8e83197dbdd4e76
SHA2561cf12145c1220d91d7e8ae2bb146babf0aaea02fe75bc63d3da1cea2d2761ae8
SHA51212a6407c24facbaee41c7780e2d3da41f719c62c0d784287078aae5ec36419a27b2a4c7d74ba96772d6d71a0d224a9d29de0bb704871a7016ba64d641814a88e
-
Filesize
48KB
MD53d9e11f133404b0de3f4fd7e375e3fbf
SHA11da48c172f95eb337a3b3427f6360d112abf907e
SHA256929bd74e00c56ec0935d5390a89dd4942abc1f3511a267034739fff0491e350b
SHA51277aa948b664f957851bb33d2276df7315d5f05abe912bed1214f6e37270a525799fb04cacd0e17a6c07fff55f96a32222ecf71fcf2104e71de153c64de8f147c