Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 21:39
Behavioral task
behavioral1
Sample
lkklnsgtnsdfgdfgsdfg.exe
Resource
win10v2004-20241007-en
General
-
Target
lkklnsgtnsdfgdfgsdfg.exe
-
Size
47KB
-
MD5
f6dac35d571337de0dcbfd8488519383
-
SHA1
f7807ad2b9c086889e492a3ff8e9a47df0d9ee19
-
SHA256
fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0
-
SHA512
5f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1
-
SSDEEP
768:DuQKNTREhzxrWUXrm5mo2q7ZwuoFI0rxfvR6fPIy840bMUCLDCUtdv8ewBkd6WRz:DuQKNTR+W2ZuojxfvR3y8zbpZU38eO0Z
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:61882
rahyufgsaf-61882.portmap.host:6606
rahyufgsaf-61882.portmap.host:7707
rahyufgsaf-61882.portmap.host:8808
rahyufgsaf-61882.portmap.host:61882
jQF9EeB2cbGS
-
delay
3
-
install
true
-
install_file
roar.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023b89-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation lkklnsgtnsdfgdfgsdfg.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 roar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkklnsgtnsdfgdfgsdfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roar.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4704 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 4792 lkklnsgtnsdfgdfgsdfg.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4792 lkklnsgtnsdfgdfgsdfg.exe Token: SeDebugPrivilege 2552 roar.exe Token: SeDebugPrivilege 1708 taskmgr.exe Token: SeSystemProfilePrivilege 1708 taskmgr.exe Token: SeCreateGlobalPrivilege 1708 taskmgr.exe Token: 33 1708 taskmgr.exe Token: SeIncBasePriorityPrivilege 1708 taskmgr.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4548 4792 lkklnsgtnsdfgdfgsdfg.exe 86 PID 4792 wrote to memory of 4548 4792 lkklnsgtnsdfgdfgsdfg.exe 86 PID 4792 wrote to memory of 4548 4792 lkklnsgtnsdfgdfgsdfg.exe 86 PID 4792 wrote to memory of 3828 4792 lkklnsgtnsdfgdfgsdfg.exe 88 PID 4792 wrote to memory of 3828 4792 lkklnsgtnsdfgdfgsdfg.exe 88 PID 4792 wrote to memory of 3828 4792 lkklnsgtnsdfgdfgsdfg.exe 88 PID 3828 wrote to memory of 4704 3828 cmd.exe 90 PID 3828 wrote to memory of 4704 3828 cmd.exe 90 PID 3828 wrote to memory of 4704 3828 cmd.exe 90 PID 4548 wrote to memory of 3544 4548 cmd.exe 91 PID 4548 wrote to memory of 3544 4548 cmd.exe 91 PID 4548 wrote to memory of 3544 4548 cmd.exe 91 PID 3828 wrote to memory of 2552 3828 cmd.exe 93 PID 3828 wrote to memory of 2552 3828 cmd.exe 93 PID 3828 wrote to memory of 2552 3828 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\lkklnsgtnsdfgdfgsdfg.exe"C:\Users\Admin\AppData\Local\Temp\lkklnsgtnsdfgdfgsdfg.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "roar" /tr '"C:\Users\Admin\AppData\Roaming\roar.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "roar" /tr '"C:\Users\Admin\AppData\Roaming\roar.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA42F.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4704
-
-
C:\Users\Admin\AppData\Roaming\roar.exe"C:\Users\Admin\AppData\Roaming\roar.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5602ce139a905e7267b3a83da62f6847a
SHA108e33aeba816999164c3c2b72b787f791807d093
SHA25637d7d00518d9768f2bca57da195d7a0443595e9086d839d9c370ec9b70b29e35
SHA512fb0a99b845bc6451d6b96a3959836912e70195f0d3b0dd86b9dbbf58825a461abefe2574432e149a57ae332bafd8ab4fdfed42c2e330497c3f40fd87291df396
-
Filesize
47KB
MD5f6dac35d571337de0dcbfd8488519383
SHA1f7807ad2b9c086889e492a3ff8e9a47df0d9ee19
SHA256fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0
SHA5125f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1