Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:37
Behavioral task
behavioral1
Sample
1P4SR_tryagainplease.exe
Resource
win7-20240903-en
General
-
Target
1P4SR_tryagainplease.exe
-
Size
63KB
-
MD5
11ee3cbc775dd3ffb5ee383aa250e46c
-
SHA1
06969e1b529d4caf9f2efc37c71ce1bd739fbc26
-
SHA256
29c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
-
SHA512
4bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd
-
SSDEEP
768:xtM6NqDuiP/tkiP9JqBIe1wl5SNyNs1+ZSCv7mqb2nrpwH1ol9v68GhZVc6KN:xiDBlnecNsPGbbOwq9fGhZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:7707
127.0.0.1:23198
benefits-required.gl.at.ply.gg:23198:7707
benefits-required.gl.at.ply.gg:23198:23198
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012263-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2880 windows defender firewall.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2736 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2376 1P4SR_tryagainplease.exe 2376 1P4SR_tryagainplease.exe 2376 1P4SR_tryagainplease.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2376 1P4SR_tryagainplease.exe Token: SeDebugPrivilege 2880 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2348 2376 1P4SR_tryagainplease.exe 31 PID 2376 wrote to memory of 2348 2376 1P4SR_tryagainplease.exe 31 PID 2376 wrote to memory of 2348 2376 1P4SR_tryagainplease.exe 31 PID 2376 wrote to memory of 2772 2376 1P4SR_tryagainplease.exe 32 PID 2376 wrote to memory of 2772 2376 1P4SR_tryagainplease.exe 32 PID 2376 wrote to memory of 2772 2376 1P4SR_tryagainplease.exe 32 PID 2348 wrote to memory of 2304 2348 cmd.exe 35 PID 2348 wrote to memory of 2304 2348 cmd.exe 35 PID 2348 wrote to memory of 2304 2348 cmd.exe 35 PID 2772 wrote to memory of 2736 2772 cmd.exe 36 PID 2772 wrote to memory of 2736 2772 cmd.exe 36 PID 2772 wrote to memory of 2736 2772 cmd.exe 36 PID 2772 wrote to memory of 2880 2772 cmd.exe 37 PID 2772 wrote to memory of 2880 2772 cmd.exe 37 PID 2772 wrote to memory of 2880 2772 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpDB13.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5d9eb44da2d754f1e64ff2e31d99387f5
SHA1ce3ccfecc21c86a1f28b12b93274cb26663a4743
SHA2563b8c48db75a57cc988782c4c0b60e434030d82a46aad7a8b82ff094518dd0819
SHA51267aeb6953267d8e9f34ca4fb860ca1d802b54dbdd88da7e9cca53f619df7f30ff23e1374ac5be43c0c15bce126164613ff7e9693a2f3031d97590c919fb66ea1
-
Filesize
63KB
MD511ee3cbc775dd3ffb5ee383aa250e46c
SHA106969e1b529d4caf9f2efc37c71ce1bd739fbc26
SHA25629c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
SHA5124bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd