Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 10:29
Behavioral task
behavioral1
Sample
image logger.exe
Resource
win7-20240903-en
General
-
Target
image logger.exe
-
Size
312KB
-
MD5
520e6035e15a9422e1c4cbada69263aa
-
SHA1
96915e5d6adf90533c2309c84e226598773d83ec
-
SHA256
99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883
-
SHA512
ffcf1ff0d9161bdc9c1bbdedc66bccb8bcf74874d25ff4f4436c57aa417160c55914ccb9cb97645c728dd4d230908f707733c30c53faeb0bbfd71e6306999b3b
-
SSDEEP
6144:Eu6ABA0Krb3LVhA+EWHYSS66Wy6666D6b6666H666K666Z2v666y7N6oZCGEB6ax:EwKXRlYSS66Wy6666D6b6666H666K666
Malware Config
Extracted
asyncrat
0.5.7B
Default
18.141.204.5:80
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
syteam.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b77-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation image logger.exe -
Executes dropped EXE 1 IoCs
pid Process 4952 syteam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syteam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language image logger.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2896 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe 4504 image logger.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4504 image logger.exe Token: SeDebugPrivilege 4952 syteam.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1744 4504 image logger.exe 82 PID 4504 wrote to memory of 1744 4504 image logger.exe 82 PID 4504 wrote to memory of 1744 4504 image logger.exe 82 PID 4504 wrote to memory of 4628 4504 image logger.exe 84 PID 4504 wrote to memory of 4628 4504 image logger.exe 84 PID 4504 wrote to memory of 4628 4504 image logger.exe 84 PID 4628 wrote to memory of 2896 4628 cmd.exe 86 PID 4628 wrote to memory of 2896 4628 cmd.exe 86 PID 4628 wrote to memory of 2896 4628 cmd.exe 86 PID 1744 wrote to memory of 2836 1744 cmd.exe 87 PID 1744 wrote to memory of 2836 1744 cmd.exe 87 PID 1744 wrote to memory of 2836 1744 cmd.exe 87 PID 4628 wrote to memory of 4952 4628 cmd.exe 88 PID 4628 wrote to memory of 4952 4628 cmd.exe 88 PID 4628 wrote to memory of 4952 4628 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\image logger.exe"C:\Users\Admin\AppData\Local\Temp\image logger.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "syteam" /tr '"C:\Users\Admin\AppData\Local\Temp\syteam.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "syteam" /tr '"C:\Users\Admin\AppData\Local\Temp\syteam.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA26A.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\syteam.exe"C:\Users\Admin\AppData\Local\Temp\syteam.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5520e6035e15a9422e1c4cbada69263aa
SHA196915e5d6adf90533c2309c84e226598773d83ec
SHA25699a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883
SHA512ffcf1ff0d9161bdc9c1bbdedc66bccb8bcf74874d25ff4f4436c57aa417160c55914ccb9cb97645c728dd4d230908f707733c30c53faeb0bbfd71e6306999b3b
-
Filesize
153B
MD5beccb43bdfc7bdbfaaf39c69e51320bd
SHA195037682c845a7fd6a03ea45ccb632e5e1b995e1
SHA256b3a483d4033d4d38dabf70d25de29f5b0f8fd8a56061368fa0ab1752d297a330
SHA512416440a69c73e433de39d8bd82649105e058f5a9b9d09294f927128b0e5053d8abd2e7b72e044307c11089d878d29be86158391f96a27d0d4e932678f4e24cfe