Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 21:37
Behavioral task
behavioral1
Sample
1P4SR_tryagainplease.exe
Resource
win7-20240903-en
General
-
Target
1P4SR_tryagainplease.exe
-
Size
63KB
-
MD5
11ee3cbc775dd3ffb5ee383aa250e46c
-
SHA1
06969e1b529d4caf9f2efc37c71ce1bd739fbc26
-
SHA256
29c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
-
SHA512
4bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd
-
SSDEEP
768:xtM6NqDuiP/tkiP9JqBIe1wl5SNyNs1+ZSCv7mqb2nrpwH1ol9v68GhZVc6KN:xiDBlnecNsPGbbOwq9fGhZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:7707
127.0.0.1:23198
benefits-required.gl.at.ply.gg:23198:7707
benefits-required.gl.at.ply.gg:23198:23198
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb3-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1P4SR_tryagainplease.exe -
Executes dropped EXE 1 IoCs
pid Process 2628 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4916 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe 1512 1P4SR_tryagainplease.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1512 1P4SR_tryagainplease.exe Token: SeDebugPrivilege 2628 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1372 1512 1P4SR_tryagainplease.exe 82 PID 1512 wrote to memory of 1372 1512 1P4SR_tryagainplease.exe 82 PID 1512 wrote to memory of 4312 1512 1P4SR_tryagainplease.exe 84 PID 1512 wrote to memory of 4312 1512 1P4SR_tryagainplease.exe 84 PID 4312 wrote to memory of 4916 4312 cmd.exe 86 PID 4312 wrote to memory of 4916 4312 cmd.exe 86 PID 1372 wrote to memory of 4580 1372 cmd.exe 87 PID 1372 wrote to memory of 4580 1372 cmd.exe 87 PID 4312 wrote to memory of 2628 4312 cmd.exe 88 PID 4312 wrote to memory of 2628 4312 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"C:\Users\Admin\AppData\Local\Temp\1P4SR_tryagainplease.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBECC.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4916
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD54ec522fa41740e40ea4ffc8a956d947b
SHA141f4c66a6d862e463672c27021a2ff44987668c8
SHA256c782391fc80d53939ade1b62d151821e37f2fdc9535c12eb98dc7a005532411c
SHA512b5e264b7128d905dc276d5a332301b8c4b08e545bb03dac2ef29958582d1727e0b88532a3e9bca805503a935345e82a1d7855d60a8575e919e1fc7229b79e0f3
-
Filesize
63KB
MD511ee3cbc775dd3ffb5ee383aa250e46c
SHA106969e1b529d4caf9f2efc37c71ce1bd739fbc26
SHA25629c74b4d8f3f1ac56cae20be01b8969ee412427e6c4a2d5e2aab678eb53ed83e
SHA5124bedbda5ce9e6f02eb72a965a56f2cfdba5229361bda7391ac71a2daa6636a48866f98504e5ff61991df6c587af129746b7399bc2d88594569ef38df19a1adfd