Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 22:15
Behavioral task
behavioral1
Sample
bwejhfzdg.exe
Resource
win10v2004-20241007-en
General
-
Target
bwejhfzdg.exe
-
Size
47KB
-
MD5
6370fe41da82c0517f932c86d67a5186
-
SHA1
44785ae42dbb4259bb14a14f8fa4454d42bc97e6
-
SHA256
3baeef9096ffe907a5df5191cacaf937fd6033eccefe1d75bda27824ae974643
-
SHA512
274078f74c489cce1723385ea9b34e3c27b99834ff93447bd5a71ab09feb03bdcd78b03655a446d8ef3e37ced1a13dd7a19b0a4166cf10695da148c00d968832
-
SSDEEP
768:kuo9dT1LxHaFzWUfbmBmo2qbOp0yJxiWfQ3PIyAd0b3wkJr63Ps6vMSUBDZcx:kuo9dT1LoG23pTiWfVyjb3wkJ63Ps6Uw
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
gba-all-twice-reputation.trycloudflare.com:6606
gba-all-twice-reputation.trycloudflare.com:7707
gba-all-twice-reputation.trycloudflare.com:8808
PLYz880kniL1
-
delay
3
-
install
true
-
install_file
roar.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000200000001e747-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation bwejhfzdg.exe -
Executes dropped EXE 1 IoCs
pid Process 1316 roar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwejhfzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1292 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe 5016 bwejhfzdg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 bwejhfzdg.exe Token: SeDebugPrivilege 1316 roar.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3548 5016 bwejhfzdg.exe 84 PID 5016 wrote to memory of 3548 5016 bwejhfzdg.exe 84 PID 5016 wrote to memory of 3548 5016 bwejhfzdg.exe 84 PID 5016 wrote to memory of 3684 5016 bwejhfzdg.exe 86 PID 5016 wrote to memory of 3684 5016 bwejhfzdg.exe 86 PID 5016 wrote to memory of 3684 5016 bwejhfzdg.exe 86 PID 3548 wrote to memory of 2276 3548 cmd.exe 88 PID 3548 wrote to memory of 2276 3548 cmd.exe 88 PID 3548 wrote to memory of 2276 3548 cmd.exe 88 PID 3684 wrote to memory of 1292 3684 cmd.exe 89 PID 3684 wrote to memory of 1292 3684 cmd.exe 89 PID 3684 wrote to memory of 1292 3684 cmd.exe 89 PID 3684 wrote to memory of 1316 3684 cmd.exe 96 PID 3684 wrote to memory of 1316 3684 cmd.exe 96 PID 3684 wrote to memory of 1316 3684 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\bwejhfzdg.exe"C:\Users\Admin\AppData\Local\Temp\bwejhfzdg.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "roar" /tr '"C:\Users\Admin\AppData\Roaming\roar.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "roar" /tr '"C:\Users\Admin\AppData\Roaming\roar.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp87D6.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1292
-
-
C:\Users\Admin\AppData\Roaming\roar.exe"C:\Users\Admin\AppData\Roaming\roar.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD525295f0b4604cdc9f0fb5db0a241bd1c
SHA19e09b0cb89d51ee24606ca194e709454cc961d46
SHA256576649c55a7c4e81052dc3e0662ebab86ff661991b9ee0864060a12770ecb0a9
SHA512fff5aca02464b748e9d7501a2d3124e4aa277341c73e1cf85c951b6b06bd7c292544884fc5a36ea844771ada3420d997be21be4a99cd7e1135b6e31844e30ee2
-
Filesize
47KB
MD56370fe41da82c0517f932c86d67a5186
SHA144785ae42dbb4259bb14a14f8fa4454d42bc97e6
SHA2563baeef9096ffe907a5df5191cacaf937fd6033eccefe1d75bda27824ae974643
SHA512274078f74c489cce1723385ea9b34e3c27b99834ff93447bd5a71ab09feb03bdcd78b03655a446d8ef3e37ced1a13dd7a19b0a4166cf10695da148c00d968832