Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-12-2024 16:02
Behavioral task
behavioral1
Sample
arf.exe
Resource
win10v2004-20241007-en
General
-
Target
arf.exe
-
Size
63KB
-
MD5
f69a0edbc9c44a09ed18e5a501b6621b
-
SHA1
7b835c5a70749c3e33c338943344ae65fe6d7aaf
-
SHA256
b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
-
SHA512
a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644
-
SSDEEP
1536:diDBlKWYEk2KwYjGbbKwg9z+aGtZVclN:dmlKWYEb6GbbK5VizY
Malware Config
Extracted
asyncrat
1.0.7
Default
roarwasd12312-34767.portmap.host:8848
roarwasd12312-34767.portmap.host:34767
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001c00000002aae3-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 5036 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4052 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe 2644 arf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 arf.exe Token: SeDebugPrivilege 5036 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1936 2644 arf.exe 78 PID 2644 wrote to memory of 1936 2644 arf.exe 78 PID 2644 wrote to memory of 1472 2644 arf.exe 79 PID 2644 wrote to memory of 1472 2644 arf.exe 79 PID 1936 wrote to memory of 3860 1936 cmd.exe 82 PID 1936 wrote to memory of 3860 1936 cmd.exe 82 PID 1472 wrote to memory of 4052 1472 cmd.exe 83 PID 1472 wrote to memory of 4052 1472 cmd.exe 83 PID 1472 wrote to memory of 5036 1472 cmd.exe 84 PID 1472 wrote to memory of 5036 1472 cmd.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\arf.exe"C:\Users\Admin\AppData\Local\Temp\arf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC285.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4052
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5ab0f14a8c767af56813c8382914cfd25
SHA1a5f5d942242f91149218022b7b7cf924eef5f78c
SHA256ef5b9a66a728a71f54bf1713114bc5b7991dd4e1a439c146a6d8581f49e63336
SHA5125bd7ce782826acd07db96c541e169ed2684de46fa6f4c50a9878452120d100a5652674a6d38b552921d541ab83b6efe63281f40e2ee6050a28904bfd243b3df0
-
Filesize
63KB
MD5f69a0edbc9c44a09ed18e5a501b6621b
SHA17b835c5a70749c3e33c338943344ae65fe6d7aaf
SHA256b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
SHA512a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644