Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:26
Behavioral task
behavioral1
Sample
1P4SR_tryagainplease.exe
Resource
win7-20240729-en
General
-
Target
1P4SR_tryagainplease.exe
-
Size
63KB
-
MD5
11ee3cbc775dd3ffb5ee383aa250e46c
-
SHA1
06969e1b529d4caf9f2efc37c71ce1bd739fbc26
-
SHA256
29c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
-
SHA512
4bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd
-
SSDEEP
768:xtM6NqDuiP/tkiP9JqBIe1wl5SNyNs1+ZSCv7mqb2nrpwH1ol9v68GhZVc6KN:xiDBlnecNsPGbbOwq9fGhZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:7707
127.0.0.1:23198
benefits-required.gl.at.ply.gg:23198:7707
benefits-required.gl.at.ply.gg:23198:23198
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001926b-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2804 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2800 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1880 1P4SR_tryagainplease.exe 1880 1P4SR_tryagainplease.exe 1880 1P4SR_tryagainplease.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1880 1P4SR_tryagainplease.exe Token: SeDebugPrivilege 2804 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1884 1880 1P4SR_tryagainplease.exe 31 PID 1880 wrote to memory of 1884 1880 1P4SR_tryagainplease.exe 31 PID 1880 wrote to memory of 1884 1880 1P4SR_tryagainplease.exe 31 PID 1880 wrote to memory of 1964 1880 1P4SR_tryagainplease.exe 33 PID 1880 wrote to memory of 1964 1880 1P4SR_tryagainplease.exe 33 PID 1880 wrote to memory of 1964 1880 1P4SR_tryagainplease.exe 33 PID 1884 wrote to memory of 2756 1884 cmd.exe 35 PID 1884 wrote to memory of 2756 1884 cmd.exe 35 PID 1884 wrote to memory of 2756 1884 cmd.exe 35 PID 1964 wrote to memory of 2800 1964 cmd.exe 36 PID 1964 wrote to memory of 2800 1964 cmd.exe 36 PID 1964 wrote to memory of 2800 1964 cmd.exe 36 PID 1964 wrote to memory of 2804 1964 cmd.exe 37 PID 1964 wrote to memory of 2804 1964 cmd.exe 37 PID 1964 wrote to memory of 2804 1964 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDA19.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2800
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5fa681d0cda4df046a4d6d048c532551a
SHA1fbd46cb1c4b8b72a059c1af79cef29a0f506ab6e
SHA25609570218976bd5acf9ffac47054d04be15e7eabd9fe7d0701f3369d7cf2b2b00
SHA5120e04c3bde5ecf5dc6d027e91d150c5c53854333a4cb2cdc67a41f71bb154ca3c32a09fd7048614b4752ead429a9cc3ae6c8fc7c283032f017a5c9159a5e2e827
-
Filesize
63KB
MD511ee3cbc775dd3ffb5ee383aa250e46c
SHA106969e1b529d4caf9f2efc37c71ce1bd739fbc26
SHA25629c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
SHA5124bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd