Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
rrats.exe
Resource
win7-20240903-en
General
-
Target
rrats.exe
-
Size
494KB
-
MD5
a2bdb024c98b7e8d3d06fc86e110d204
-
SHA1
2442360d37bf7e60b0d20c447bf5a0b51635a1d4
-
SHA256
72cd6d490f03122c90b4a52c8bc7fb5b938123eaf4926b5cc5cee14f44bef3cf
-
SHA512
b60afa45e29ddee3e3dc0d7e61bd5b9f3fb1d0c03a0655ab8f6c80b1fc5d6ff51f1b07a1af7ab1ce28d373f990d830f2f1c6e3c0e1efbaa280361a250ecb6850
-
SSDEEP
6144:rTouKrWBEu3/Z2lpGDHU3ykJVX+tLC/Jm808PYfz1b8s4GYAMwX:rToPWBv/cpGrU3yUX+tLGA8mJbV2o
Malware Config
Extracted
asyncrat
true
Discord H
RRAT_nMo7Zfs0N
-
delay
3
-
install
false
-
install_file
powershell Add-MpPreference -ExclusionPath C:\
-
install_folder
Explorer.exe
-
pastebin_config
http://pastebin.com/raw/KKpnJShN
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c8a-14.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1720 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation rrat.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation rrats.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation a.exe -
Executes dropped EXE 3 IoCs
pid Process 3840 a.exe 628 rrat.exe 3888 Explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 pastebin.com 16 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1532 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1568 schtasks.exe 1552 schtasks.exe 2872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1720 powershell.exe 1720 powershell.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe 628 rrat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 628 rrat.exe Token: SeDebugPrivilege 3888 Explorer.exe Token: SeDebugPrivilege 3888 Explorer.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2040 wrote to memory of 720 2040 rrats.exe 83 PID 2040 wrote to memory of 720 2040 rrats.exe 83 PID 2040 wrote to memory of 720 2040 rrats.exe 83 PID 720 wrote to memory of 3840 720 cmd.exe 86 PID 720 wrote to memory of 3840 720 cmd.exe 86 PID 720 wrote to memory of 3840 720 cmd.exe 86 PID 3840 wrote to memory of 628 3840 a.exe 87 PID 3840 wrote to memory of 628 3840 a.exe 87 PID 3840 wrote to memory of 628 3840 a.exe 87 PID 628 wrote to memory of 3932 628 rrat.exe 88 PID 628 wrote to memory of 3932 628 rrat.exe 88 PID 628 wrote to memory of 3932 628 rrat.exe 88 PID 3932 wrote to memory of 1720 3932 cmd.exe 90 PID 3932 wrote to memory of 1720 3932 cmd.exe 90 PID 3932 wrote to memory of 1720 3932 cmd.exe 90 PID 628 wrote to memory of 4736 628 rrat.exe 91 PID 628 wrote to memory of 4736 628 rrat.exe 91 PID 628 wrote to memory of 4736 628 rrat.exe 91 PID 628 wrote to memory of 4856 628 rrat.exe 93 PID 628 wrote to memory of 4856 628 rrat.exe 93 PID 628 wrote to memory of 4856 628 rrat.exe 93 PID 4736 wrote to memory of 1552 4736 cmd.exe 95 PID 4736 wrote to memory of 1552 4736 cmd.exe 95 PID 4736 wrote to memory of 1552 4736 cmd.exe 95 PID 4856 wrote to memory of 1532 4856 cmd.exe 96 PID 4856 wrote to memory of 1532 4856 cmd.exe 96 PID 4856 wrote to memory of 1532 4856 cmd.exe 96 PID 4856 wrote to memory of 3888 4856 cmd.exe 97 PID 4856 wrote to memory of 3888 4856 cmd.exe 97 PID 4856 wrote to memory of 3888 4856 cmd.exe 97 PID 3888 wrote to memory of 456 3888 Explorer.exe 104 PID 3888 wrote to memory of 456 3888 Explorer.exe 104 PID 3888 wrote to memory of 456 3888 Explorer.exe 104 PID 3888 wrote to memory of 4996 3888 Explorer.exe 106 PID 3888 wrote to memory of 4996 3888 Explorer.exe 106 PID 3888 wrote to memory of 4996 3888 Explorer.exe 106 PID 456 wrote to memory of 1568 456 cmd.exe 108 PID 456 wrote to memory of 1568 456 cmd.exe 108 PID 456 wrote to memory of 1568 456 cmd.exe 108 PID 4996 wrote to memory of 2872 4996 cmd.exe 109 PID 4996 wrote to memory of 2872 4996 cmd.exe 109 PID 4996 wrote to memory of 2872 4996 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\rrats.exe"C:\Users\Admin\AppData\Local\Temp\rrats.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.exea.exe -p12343⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\rrat.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\rrat.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Add-MpPreference -ExclusionPath C:\5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE1D4.tmp.bat""5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\Explorer.exe"C:\Users\Admin\AppData\Roaming\Explorer.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2872
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD5cc1bfa4d25dc0d101cfe0a22852e9f00
SHA151c0172ac90f74fa675d96f326c2df8e85cc35ff
SHA2563276f0ce57358545885aa30b873fa4b604a94689b7528a174d8c9e819873fb08
SHA512d376d38607b12ffe2edafedf4a0c1932c88fe9db4e0a247d5104140d8da311a3b752c0d9a52e6048e3247d13efb3224218f56d276b22f2f26663e05334de81ec
-
Filesize
301KB
MD57107f3fb53f9f3eaf3b95fd857f7aee9
SHA181e0dfe67b3b098c331eb3964e670e7762749b40
SHA2563d74cbfd24a606b7f8c1e980cb08365c3127bed66b813f6fc7fb53eb19171cc0
SHA512cd42e3d36a1f0bf7f0429df7ee0780d1d7039f0139f91e0cb71a488c8d50973df53fe70a7cdb09e50e5651e2c1a7fef3da0a4cb1e9225c5071711bd2d9f2e5d8
-
Filesize
66KB
MD53d91c31a52be4e262f7f18272294ed99
SHA17c120a607650348fc4dfcdacdc77bf5885a9e6ac
SHA256b99b28b82c9da1b009898da323d4793dde7828efcf777a56a835d54cbfec849d
SHA512d17cc9db4d263addd524baa7b67974b2d4f0b904f46367cd6138805cd65a8364ea700a9df147dbb6dac8b1e7288a87fe24c497e1b1825f49b576e101789856d1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
152B
MD58d00c2c58facd176a8f47ae4c1812d31
SHA14d1fa0d1576d33ddba2dabad6dfe8fd16be3926c
SHA256f5aea63336a66e5e3961dae937cfb91eabf470df7cf85f008fb22089fdd7d643
SHA512d047871125abe138490b633c0bee59bf256c9a95738d0773c1385abdba1ca5422b17572d9a12aac20fdb59cdc8e201200a719bc4bdcb25103ee46d514880b4ed