Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 00:14
Behavioral task
behavioral1
Sample
latencyx.exe
Resource
win7-20240708-en
General
-
Target
latencyx.exe
-
Size
45KB
-
MD5
f4c46528fb0b51636d9c5860e0e4048e
-
SHA1
76c0d55950b8e8995f0cc75d35f620f39d13ae1b
-
SHA256
2ac2e1571a16168fb4ca930eb4b1a27fdbbff15f87384c13565f44fc22c4a8c7
-
SHA512
aa6f1833ff1367bf938c2d52227707fb64c6ceaa5acbffd879150b094fc5a6b163e777ddbb7cc6cb33c3c15ec61ae7dbfc8c6462cf574bff43c88bf207fc80b9
-
SSDEEP
768:GuEs9THvkHCWU0neImo2q88maPol53APIkzjb+gX3i90yHCFB/JkAX1kBDZSx:GuEs9THc72cfob3lk3bBXS908CFnkAXh
Malware Config
Extracted
asyncrat
0.5.8
Default
t1euvzy.localto.net:2171
t1euvzy.localto.net:55065
ZpDC6oZwIVKp
-
delay
3
-
install
false
-
install_file
dwmm.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language latencyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4764 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4004 latencyx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3768 4004 latencyx.exe 101 PID 4004 wrote to memory of 3768 4004 latencyx.exe 101 PID 4004 wrote to memory of 3768 4004 latencyx.exe 101 PID 3768 wrote to memory of 4764 3768 cmd.exe 103 PID 3768 wrote to memory of 4764 3768 cmd.exe 103 PID 3768 wrote to memory of 4764 3768 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\latencyx.exe"C:\Users\Admin\AppData\Local\Temp\latencyx.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp549E.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD57faa55b41e734931a1676876db1cb128
SHA17a4f05bb9a587069a152ead8f6bad35113ec716d
SHA25672c7c0f541e0f6840638299a59a5091a9227195570bf721e603b21f376ee25ca
SHA512e627a4da3d3551b25f3d3a713725bd5ed2515da4d945905f0c9392d4a9651e7862bddb8d12d68ac269a6b909e626d30db49b2b5e6d637c50e035b291e59ab576