Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 00:10
Behavioral task
behavioral1
Sample
latencyx.exe
Resource
win7-20240903-en
General
-
Target
latencyx.exe
-
Size
45KB
-
MD5
f4c46528fb0b51636d9c5860e0e4048e
-
SHA1
76c0d55950b8e8995f0cc75d35f620f39d13ae1b
-
SHA256
2ac2e1571a16168fb4ca930eb4b1a27fdbbff15f87384c13565f44fc22c4a8c7
-
SHA512
aa6f1833ff1367bf938c2d52227707fb64c6ceaa5acbffd879150b094fc5a6b163e777ddbb7cc6cb33c3c15ec61ae7dbfc8c6462cf574bff43c88bf207fc80b9
-
SSDEEP
768:GuEs9THvkHCWU0neImo2q88maPol53APIkzjb+gX3i90yHCFB/JkAX1kBDZSx:GuEs9THc72cfob3lk3bBXS908CFnkAXh
Malware Config
Extracted
asyncrat
0.5.8
Default
t1euvzy.localto.net:2171
t1euvzy.localto.net:55065
ZpDC6oZwIVKp
-
delay
3
-
install
false
-
install_file
dwmm.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language latencyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2568 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4972 latencyx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4548 4972 latencyx.exe 103 PID 4972 wrote to memory of 4548 4972 latencyx.exe 103 PID 4972 wrote to memory of 4548 4972 latencyx.exe 103 PID 4548 wrote to memory of 2568 4548 cmd.exe 105 PID 4548 wrote to memory of 2568 4548 cmd.exe 105 PID 4548 wrote to memory of 2568 4548 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\latencyx.exe"C:\Users\Admin\AppData\Local\Temp\latencyx.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA60A.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD533446c8c34b325ab6aded71f58d970cf
SHA14a4e1b9e49243cedb76cc36ae9966ec0e2654fb1
SHA2566e40874a556efa5a9ec50f541a9809ea1df056048a92b931455c5ed6b7c3320f
SHA512c1a29349577e5831175336d02a29d3a181faf92fe8bcb2a116dbf4f3717ee534588f4bdd4411b8a89909707228c26699b388a24130ddc65601b6a5216ce8ff44