Analysis
-
max time kernel
71s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 17:27
General
-
Target
Client.exe
-
Size
48KB
-
MD5
44d5a1bc0e71ec156b541be860ef9c09
-
SHA1
1e89133ce94f3c59e38ed7b27db874b1e2cb3ef2
-
SHA256
635540183ad0c6215eca493fd500c32e9bfa01efa7b0efb389cd40fd0db62482
-
SHA512
c780f6f38b28c42241c7dfee874ac0eab3d7dc493f240bc0e748e75d7e6e830449d70057179a36db1b8af69dc274e9c1b512b430ef1d549329b6eae6e91f8419
-
SSDEEP
768:mMRJZBILLWQ9+jiwtelDSN+iV08YbygeUfdJLKoYwvEgK/JbZVc6KN:mMRq9wtKDs4zb1vlKo1nkJbZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:40721
Binky812-40721.portmap.host:8848
Binky812-40721.portmap.host:40721
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
MinecraftUpdater.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000c000000023b74-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 4956 MinecraftUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2316 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 1216 Client.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe 4956 MinecraftUpdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1216 Client.exe Token: SeDebugPrivilege 4956 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4652 1216 Client.exe 85 PID 1216 wrote to memory of 4652 1216 Client.exe 85 PID 1216 wrote to memory of 980 1216 Client.exe 87 PID 1216 wrote to memory of 980 1216 Client.exe 87 PID 4652 wrote to memory of 1304 4652 cmd.exe 90 PID 4652 wrote to memory of 1304 4652 cmd.exe 90 PID 980 wrote to memory of 2316 980 cmd.exe 89 PID 980 wrote to memory of 2316 980 cmd.exe 89 PID 980 wrote to memory of 4956 980 cmd.exe 93 PID 980 wrote to memory of 4956 980 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6496.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2316
-
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5859fc01666e1895be1d9f240eab51038
SHA18736ffd1bf66b58b96e01631f5c26dfa726e91f0
SHA2564e866ba6b93eeb648b3c03c0a296d87934ec31ae8ff680c84e1bd16aaa15021c
SHA512d51176460105930b749c80e099e1bcb9111edc2fbac0c116309c9ab1cbc46fad46193b13d1d12a4f97015391d213cf0a25025cd01c052765412d713ebfcf0676
-
Filesize
48KB
MD544d5a1bc0e71ec156b541be860ef9c09
SHA11e89133ce94f3c59e38ed7b27db874b1e2cb3ef2
SHA256635540183ad0c6215eca493fd500c32e9bfa01efa7b0efb389cd40fd0db62482
SHA512c780f6f38b28c42241c7dfee874ac0eab3d7dc493f240bc0e748e75d7e6e830449d70057179a36db1b8af69dc274e9c1b512b430ef1d549329b6eae6e91f8419