Analysis
-
max time kernel
125s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:02
Behavioral task
behavioral1
Sample
arf.exe
Resource
win10v2004-20241007-en
General
-
Target
arf.exe
-
Size
63KB
-
MD5
f69a0edbc9c44a09ed18e5a501b6621b
-
SHA1
7b835c5a70749c3e33c338943344ae65fe6d7aaf
-
SHA256
b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
-
SHA512
a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644
-
SSDEEP
1536:diDBlKWYEk2KwYjGbbKwg9z+aGtZVclN:dmlKWYEb6GbbK5VizY
Malware Config
Extracted
asyncrat
1.0.7
Default
roarwasd12312-34767.portmap.host:8848
roarwasd12312-34767.portmap.host:34767
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000023b71-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation arf.exe -
Executes dropped EXE 1 IoCs
pid Process 4036 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4280 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 4472 arf.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4472 arf.exe Token: SeDebugPrivilege 4036 windows defender firewall.exe Token: SeDebugPrivilege 764 taskmgr.exe Token: SeSystemProfilePrivilege 764 taskmgr.exe Token: SeCreateGlobalPrivilege 764 taskmgr.exe Token: 33 764 taskmgr.exe Token: SeIncBasePriorityPrivilege 764 taskmgr.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe 764 taskmgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3052 4472 arf.exe 83 PID 4472 wrote to memory of 3052 4472 arf.exe 83 PID 4472 wrote to memory of 1996 4472 arf.exe 85 PID 4472 wrote to memory of 1996 4472 arf.exe 85 PID 1996 wrote to memory of 4280 1996 cmd.exe 87 PID 1996 wrote to memory of 4280 1996 cmd.exe 87 PID 3052 wrote to memory of 4912 3052 cmd.exe 88 PID 3052 wrote to memory of 4912 3052 cmd.exe 88 PID 1996 wrote to memory of 4036 1996 cmd.exe 90 PID 1996 wrote to memory of 4036 1996 cmd.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\arf.exe"C:\Users\Admin\AppData\Local\Temp\arf.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp784D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4280
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD573d3addf2317129da19795be76a41188
SHA1cf86151e1e363fd5145de5671dd5d36ceda29ea9
SHA256c7b045cce70f9982b33ed21c1c501f0a1757ebda095c151b0f415fc5ef02050d
SHA512e57b1a54ef47954d2f0f6df239115a2d9a5e1fc4d7606a15dcf09c3debd9ca6100d4ed2cb59ed1de7c479ae776b98bcb51de57ed0fa6941eb797d0c0d74a73c5
-
Filesize
63KB
MD5f69a0edbc9c44a09ed18e5a501b6621b
SHA17b835c5a70749c3e33c338943344ae65fe6d7aaf
SHA256b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
SHA512a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644