Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09/12/2024, 16:03
Behavioral task
behavioral1
Sample
arf.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
arf.exe
-
Size
63KB
-
MD5
f69a0edbc9c44a09ed18e5a501b6621b
-
SHA1
7b835c5a70749c3e33c338943344ae65fe6d7aaf
-
SHA256
b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
-
SHA512
a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644
-
SSDEEP
1536:diDBlKWYEk2KwYjGbbKwg9z+aGtZVclN:dmlKWYEb6GbbK5VizY
Malware Config
Extracted
asyncrat
1.0.7
Default
roarwasd12312-34767.portmap.host:8848
roarwasd12312-34767.portmap.host:34767
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0029000000045047-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation arf.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3920 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe 1260 arf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1260 arf.exe Token: SeDebugPrivilege 1724 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2400 1260 arf.exe 84 PID 1260 wrote to memory of 2400 1260 arf.exe 84 PID 1260 wrote to memory of 1812 1260 arf.exe 85 PID 1260 wrote to memory of 1812 1260 arf.exe 85 PID 2400 wrote to memory of 4568 2400 cmd.exe 88 PID 2400 wrote to memory of 4568 2400 cmd.exe 88 PID 1812 wrote to memory of 3920 1812 cmd.exe 89 PID 1812 wrote to memory of 3920 1812 cmd.exe 89 PID 1812 wrote to memory of 1724 1812 cmd.exe 92 PID 1812 wrote to memory of 1724 1812 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\arf.exe"C:\Users\Admin\AppData\Local\Temp\arf.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6784.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3920
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD55759942a9c4ab1b3b23b28946c5b26c3
SHA16510cc353b31e7936f75c9531532adda2296f014
SHA256e7dfc73f93f8e40a85cffbacee740a28b4bb2e6ae05e94ee91875e88e1025d35
SHA512ee4f68e4f88aa82c6a5f8daf001e5ab332474ea0718e03276ac46af3aff222b708316078596cfaa51a26134ddabda9a6670c4b86e5e7adf86a0e0936b755ed57
-
Filesize
63KB
MD5f69a0edbc9c44a09ed18e5a501b6621b
SHA17b835c5a70749c3e33c338943344ae65fe6d7aaf
SHA256b1c2d42876dbd40a3cbce84cd5e4e44b76c2e35c7618f9c831416d6442667d33
SHA512a8067e96218406d1afa94c827d630b5835374db71c794d6de0f6a75756935cc4b2ee74bb72f9ac2034a6d8ccab81a503aeca01b6fad76b17a59ed4ebd1703644