Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 12:02
Behavioral task
behavioral1
Sample
99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe
Resource
win7-20240903-en
General
-
Target
99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe
-
Size
312KB
-
MD5
520e6035e15a9422e1c4cbada69263aa
-
SHA1
96915e5d6adf90533c2309c84e226598773d83ec
-
SHA256
99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883
-
SHA512
ffcf1ff0d9161bdc9c1bbdedc66bccb8bcf74874d25ff4f4436c57aa417160c55914ccb9cb97645c728dd4d230908f707733c30c53faeb0bbfd71e6306999b3b
-
SSDEEP
6144:Eu6ABA0Krb3LVhA+EWHYSS66Wy6666D6b6666H666K666Z2v666y7N6oZCGEB6ax:EwKXRlYSS66Wy6666D6b6666H666K666
Malware Config
Extracted
asyncrat
0.5.7B
Default
18.141.204.5:80
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
syteam.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a0000000120d6-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2680 syteam.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syteam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2916 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe Token: SeDebugPrivilege 2680 syteam.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2724 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 30 PID 2676 wrote to memory of 2724 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 30 PID 2676 wrote to memory of 2724 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 30 PID 2676 wrote to memory of 2724 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 30 PID 2676 wrote to memory of 2936 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 32 PID 2676 wrote to memory of 2936 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 32 PID 2676 wrote to memory of 2936 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 32 PID 2676 wrote to memory of 2936 2676 99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe 32 PID 2724 wrote to memory of 2596 2724 cmd.exe 34 PID 2724 wrote to memory of 2596 2724 cmd.exe 34 PID 2724 wrote to memory of 2596 2724 cmd.exe 34 PID 2724 wrote to memory of 2596 2724 cmd.exe 34 PID 2936 wrote to memory of 2916 2936 cmd.exe 35 PID 2936 wrote to memory of 2916 2936 cmd.exe 35 PID 2936 wrote to memory of 2916 2936 cmd.exe 35 PID 2936 wrote to memory of 2916 2936 cmd.exe 35 PID 2936 wrote to memory of 2680 2936 cmd.exe 36 PID 2936 wrote to memory of 2680 2936 cmd.exe 36 PID 2936 wrote to memory of 2680 2936 cmd.exe 36 PID 2936 wrote to memory of 2680 2936 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe"C:\Users\Admin\AppData\Local\Temp\99a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "syteam" /tr '"C:\Users\Admin\AppData\Local\Temp\syteam.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "syteam" /tr '"C:\Users\Admin\AppData\Local\Temp\syteam.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3C64.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\syteam.exe"C:\Users\Admin\AppData\Local\Temp\syteam.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5a2e9a0966aebfa0575c51bc43bcbcaa7
SHA1cd00148fe40675b0b35a0111ed0eda62c3378332
SHA2565198909ec5b8fcea63082e556c522e261f7e47db8f84816ebe85316b1ce56b38
SHA512e5b1528b9dbae13718a4fc121073ccc674448f52a315a721a240b43e8f3c75c34516ff18d64bae7a4165e301200d74d1f7aef7f859b2b379b0c741f75e00167d
-
Filesize
312KB
MD5520e6035e15a9422e1c4cbada69263aa
SHA196915e5d6adf90533c2309c84e226598773d83ec
SHA25699a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883
SHA512ffcf1ff0d9161bdc9c1bbdedc66bccb8bcf74874d25ff4f4436c57aa417160c55914ccb9cb97645c728dd4d230908f707733c30c53faeb0bbfd71e6306999b3b