Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:32
Behavioral task
behavioral1
Sample
compiledarf.exe
Resource
win7-20241010-en
General
-
Target
compiledarf.exe
-
Size
63KB
-
MD5
ea5d1b32226cdc5b47903ec7aeeeb405
-
SHA1
e8856792f77520b275be6c9d9ef432fc0e074c20
-
SHA256
6ba7a844aa103b2de7a4c715b8adfe0bb5a3bca4c3892afe68f605de6b66cada
-
SHA512
89ed2cb5b444e1cf96f7e8ee46e701ee55e0377059a3cf3180de2bbec719e9f11c89b3746793e3bd0ce00f2daa58ea46bc6cee9a020f8c06ad89f6bbae448d72
-
SSDEEP
1536:9oiDBldX7Gt4Jb1Gbb0wsUvAVGP1ZVclN:2mldX7Gt4Gbb03UDzY
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:7707
127.0.0.1:61882
benefits-required.gl.at.ply.gg:23198:7707
benefits-required.gl.at.ply.gg:23198:61882
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00090000000120fe-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2988 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2848 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2952 compiledarf.exe 2952 compiledarf.exe 2952 compiledarf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2952 compiledarf.exe Token: SeDebugPrivilege 2988 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2800 2952 compiledarf.exe 30 PID 2952 wrote to memory of 2800 2952 compiledarf.exe 30 PID 2952 wrote to memory of 2800 2952 compiledarf.exe 30 PID 2952 wrote to memory of 2928 2952 compiledarf.exe 32 PID 2952 wrote to memory of 2928 2952 compiledarf.exe 32 PID 2952 wrote to memory of 2928 2952 compiledarf.exe 32 PID 2800 wrote to memory of 2776 2800 cmd.exe 33 PID 2800 wrote to memory of 2776 2800 cmd.exe 33 PID 2800 wrote to memory of 2776 2800 cmd.exe 33 PID 2928 wrote to memory of 2848 2928 cmd.exe 35 PID 2928 wrote to memory of 2848 2928 cmd.exe 35 PID 2928 wrote to memory of 2848 2928 cmd.exe 35 PID 2928 wrote to memory of 2988 2928 cmd.exe 36 PID 2928 wrote to memory of 2988 2928 cmd.exe 36 PID 2928 wrote to memory of 2988 2928 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\compiledarf.exe"C:\Users\Admin\AppData\Local\Temp\compiledarf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2655.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2848
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD51d16940f224dd8e81110b58d39c320fb
SHA1ee95dd30273746c5f5e65bff20d8eda59a92806b
SHA256670987ee0e52d6e1e6e5991131bf5b99747cd11ed63ed527279e47e12340e35b
SHA512b6f0a3a376305ed5134379225ba3000e1342edaa78399e5287d71420f4a6c58aebbd1b7725d46424d90a5814c699767aaa7174fa748d0a559807d2713c9728d1
-
Filesize
63KB
MD5ea5d1b32226cdc5b47903ec7aeeeb405
SHA1e8856792f77520b275be6c9d9ef432fc0e074c20
SHA2566ba7a844aa103b2de7a4c715b8adfe0bb5a3bca4c3892afe68f605de6b66cada
SHA51289ed2cb5b444e1cf96f7e8ee46e701ee55e0377059a3cf3180de2bbec719e9f11c89b3746793e3bd0ce00f2daa58ea46bc6cee9a020f8c06ad89f6bbae448d72