Analysis
-
max time kernel
126s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
rrats.exe
Resource
win7-20241010-en
General
-
Target
rrats.exe
-
Size
494KB
-
MD5
a2bdb024c98b7e8d3d06fc86e110d204
-
SHA1
2442360d37bf7e60b0d20c447bf5a0b51635a1d4
-
SHA256
72cd6d490f03122c90b4a52c8bc7fb5b938123eaf4926b5cc5cee14f44bef3cf
-
SHA512
b60afa45e29ddee3e3dc0d7e61bd5b9f3fb1d0c03a0655ab8f6c80b1fc5d6ff51f1b07a1af7ab1ce28d373f990d830f2f1c6e3c0e1efbaa280361a250ecb6850
-
SSDEEP
6144:rTouKrWBEu3/Z2lpGDHU3ykJVX+tLC/Jm808PYfz1b8s4GYAMwX:rToPWBv/cpGrU3yUX+tLGA8mJbV2o
Malware Config
Extracted
asyncrat
true
Discord H
RRAT_nMo7Zfs0N
-
delay
3
-
install
false
-
install_file
powershell Add-MpPreference -ExclusionPath C:\
-
install_folder
Explorer.exe
-
pastebin_config
http://pastebin.com/raw/KKpnJShN
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000186c9-24.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2324 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2920 a.exe 2976 rrat.exe 2284 Explorer.exe -
Loads dropped DLL 6 IoCs
pid Process 2828 cmd.exe 2920 a.exe 2920 a.exe 2920 a.exe 2920 a.exe 2148 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 6 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 764 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe 1928 schtasks.exe 2772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2324 powershell.exe 2976 rrat.exe 2976 rrat.exe 2976 rrat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 2976 rrat.exe Token: SeDebugPrivilege 2284 Explorer.exe Token: SeDebugPrivilege 2284 Explorer.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2828 1824 rrats.exe 30 PID 1824 wrote to memory of 2828 1824 rrats.exe 30 PID 1824 wrote to memory of 2828 1824 rrats.exe 30 PID 1824 wrote to memory of 2828 1824 rrats.exe 30 PID 2828 wrote to memory of 2920 2828 cmd.exe 32 PID 2828 wrote to memory of 2920 2828 cmd.exe 32 PID 2828 wrote to memory of 2920 2828 cmd.exe 32 PID 2828 wrote to memory of 2920 2828 cmd.exe 32 PID 2920 wrote to memory of 2976 2920 a.exe 33 PID 2920 wrote to memory of 2976 2920 a.exe 33 PID 2920 wrote to memory of 2976 2920 a.exe 33 PID 2920 wrote to memory of 2976 2920 a.exe 33 PID 2976 wrote to memory of 2128 2976 rrat.exe 34 PID 2976 wrote to memory of 2128 2976 rrat.exe 34 PID 2976 wrote to memory of 2128 2976 rrat.exe 34 PID 2976 wrote to memory of 2128 2976 rrat.exe 34 PID 2128 wrote to memory of 2324 2128 cmd.exe 36 PID 2128 wrote to memory of 2324 2128 cmd.exe 36 PID 2128 wrote to memory of 2324 2128 cmd.exe 36 PID 2128 wrote to memory of 2324 2128 cmd.exe 36 PID 2976 wrote to memory of 2080 2976 rrat.exe 37 PID 2976 wrote to memory of 2080 2976 rrat.exe 37 PID 2976 wrote to memory of 2080 2976 rrat.exe 37 PID 2976 wrote to memory of 2080 2976 rrat.exe 37 PID 2976 wrote to memory of 2148 2976 rrat.exe 39 PID 2976 wrote to memory of 2148 2976 rrat.exe 39 PID 2976 wrote to memory of 2148 2976 rrat.exe 39 PID 2976 wrote to memory of 2148 2976 rrat.exe 39 PID 2080 wrote to memory of 2016 2080 cmd.exe 41 PID 2080 wrote to memory of 2016 2080 cmd.exe 41 PID 2080 wrote to memory of 2016 2080 cmd.exe 41 PID 2080 wrote to memory of 2016 2080 cmd.exe 41 PID 2148 wrote to memory of 764 2148 cmd.exe 42 PID 2148 wrote to memory of 764 2148 cmd.exe 42 PID 2148 wrote to memory of 764 2148 cmd.exe 42 PID 2148 wrote to memory of 764 2148 cmd.exe 42 PID 2148 wrote to memory of 2284 2148 cmd.exe 43 PID 2148 wrote to memory of 2284 2148 cmd.exe 43 PID 2148 wrote to memory of 2284 2148 cmd.exe 43 PID 2148 wrote to memory of 2284 2148 cmd.exe 43 PID 2284 wrote to memory of 2764 2284 Explorer.exe 44 PID 2284 wrote to memory of 2764 2284 Explorer.exe 44 PID 2284 wrote to memory of 2764 2284 Explorer.exe 44 PID 2284 wrote to memory of 2764 2284 Explorer.exe 44 PID 2284 wrote to memory of 2988 2284 Explorer.exe 46 PID 2284 wrote to memory of 2988 2284 Explorer.exe 46 PID 2284 wrote to memory of 2988 2284 Explorer.exe 46 PID 2284 wrote to memory of 2988 2284 Explorer.exe 46 PID 2764 wrote to memory of 1928 2764 cmd.exe 48 PID 2764 wrote to memory of 1928 2764 cmd.exe 48 PID 2764 wrote to memory of 1928 2764 cmd.exe 48 PID 2764 wrote to memory of 1928 2764 cmd.exe 48 PID 2988 wrote to memory of 2772 2988 cmd.exe 49 PID 2988 wrote to memory of 2772 2988 cmd.exe 49 PID 2988 wrote to memory of 2772 2988 cmd.exe 49 PID 2988 wrote to memory of 2772 2988 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\rrats.exe"C:\Users\Admin\AppData\Local\Temp\rrats.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\a.exea.exe -p12343⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\rrat.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\rrat.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell Add-MpPreference -ExclusionPath C:\5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows\WindowsUpdater" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp85B3.tmp.bat""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\Explorer.exe"C:\Users\Admin\AppData\Roaming\Explorer.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdate" /tr "C:\Users\Admin\AppData\Local\explore.exe"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Cschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONIDLE /i 1 /rl highest /tn "Windows\WinUpdaters" /tr "cmd.exe /C powershell Add-MpPreference -ExclusionPath C:\"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD5cc1bfa4d25dc0d101cfe0a22852e9f00
SHA151c0172ac90f74fa675d96f326c2df8e85cc35ff
SHA2563276f0ce57358545885aa30b873fa4b604a94689b7528a174d8c9e819873fb08
SHA512d376d38607b12ffe2edafedf4a0c1932c88fe9db4e0a247d5104140d8da311a3b752c0d9a52e6048e3247d13efb3224218f56d276b22f2f26663e05334de81ec
-
Filesize
152B
MD520a8bb53566d5143553d4890a4b02e38
SHA13bf16509e16971c8815dbadb66fb69416f2504b1
SHA256d9e4fe2e399d416bd086c98fe3a46b3e3ce2adfbf5252394aa6476edfc255def
SHA5128ea34e491ee397207b3572bb725cde86e7ebb281fe3da9f9274e91fe9691c62484643455fda6b4f5a96b1db6e7719defd81717f1445ca5e7b06f350cb7b9b758
-
Filesize
301KB
MD57107f3fb53f9f3eaf3b95fd857f7aee9
SHA181e0dfe67b3b098c331eb3964e670e7762749b40
SHA2563d74cbfd24a606b7f8c1e980cb08365c3127bed66b813f6fc7fb53eb19171cc0
SHA512cd42e3d36a1f0bf7f0429df7ee0780d1d7039f0139f91e0cb71a488c8d50973df53fe70a7cdb09e50e5651e2c1a7fef3da0a4cb1e9225c5071711bd2d9f2e5d8
-
Filesize
66KB
MD53d91c31a52be4e262f7f18272294ed99
SHA17c120a607650348fc4dfcdacdc77bf5885a9e6ac
SHA256b99b28b82c9da1b009898da323d4793dde7828efcf777a56a835d54cbfec849d
SHA512d17cc9db4d263addd524baa7b67974b2d4f0b904f46367cd6138805cd65a8364ea700a9df147dbb6dac8b1e7288a87fe24c497e1b1825f49b576e101789856d1