Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 21:21
Behavioral task
behavioral1
Sample
compiledarf.exe
Resource
win10v2004-20241007-en
General
-
Target
compiledarf.exe
-
Size
63KB
-
MD5
ea5d1b32226cdc5b47903ec7aeeeb405
-
SHA1
e8856792f77520b275be6c9d9ef432fc0e074c20
-
SHA256
6ba7a844aa103b2de7a4c715b8adfe0bb5a3bca4c3892afe68f605de6b66cada
-
SHA512
89ed2cb5b444e1cf96f7e8ee46e701ee55e0377059a3cf3180de2bbec719e9f11c89b3746793e3bd0ce00f2daa58ea46bc6cee9a020f8c06ad89f6bbae448d72
-
SSDEEP
1536:9oiDBldX7Gt4Jb1Gbb0wsUvAVGP1ZVclN:2mldX7Gt4Gbb03UDzY
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:7707
127.0.0.1:61882
benefits-required.gl.at.ply.gg:23198:7707
benefits-required.gl.at.ply.gg:23198:61882
roaroaroaraoroaroaraoraoraoarororrohrorororoaroaaoaoaoaroaroar
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7a-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation compiledarf.exe -
Executes dropped EXE 1 IoCs
pid Process 1740 windows defender firewall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4160 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe 460 compiledarf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 460 compiledarf.exe Token: SeDebugPrivilege 1740 windows defender firewall.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 460 wrote to memory of 3340 460 compiledarf.exe 83 PID 460 wrote to memory of 3340 460 compiledarf.exe 83 PID 460 wrote to memory of 2828 460 compiledarf.exe 85 PID 460 wrote to memory of 2828 460 compiledarf.exe 85 PID 2828 wrote to memory of 4160 2828 cmd.exe 87 PID 2828 wrote to memory of 4160 2828 cmd.exe 87 PID 3340 wrote to memory of 1164 3340 cmd.exe 88 PID 3340 wrote to memory of 1164 3340 cmd.exe 88 PID 2828 wrote to memory of 1740 2828 cmd.exe 90 PID 2828 wrote to memory of 1740 2828 cmd.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\compiledarf.exe"C:\Users\Admin\AppData\Local\Temp\compiledarf.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows defender firewall" /tr '"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9839.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4160
-
-
C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"C:\Users\Admin\AppData\Roaming\windows defender firewall.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5ebf761061978c07ea878fe85ca206f1b
SHA171f8ffd236a7dc44d0cb57bf1abed5fbc1737668
SHA2568b30701e4431d3792da63368e72e3c8007873377367419a94fa67cdcf0a85bd4
SHA512bacae9130a446112ce8f5482539edcf2bb939e0d6c95b40afff685cdfd8afc3cf5c390d840c279f454e573a0af0aa87fa44864727ddc44a1730b464f326f64e5
-
Filesize
63KB
MD5ea5d1b32226cdc5b47903ec7aeeeb405
SHA1e8856792f77520b275be6c9d9ef432fc0e074c20
SHA2566ba7a844aa103b2de7a4c715b8adfe0bb5a3bca4c3892afe68f605de6b66cada
SHA51289ed2cb5b444e1cf96f7e8ee46e701ee55e0377059a3cf3180de2bbec719e9f11c89b3746793e3bd0ce00f2daa58ea46bc6cee9a020f8c06ad89f6bbae448d72