Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 17:38
General
-
Target
Client.exe
-
Size
48KB
-
MD5
d9b8c518ec57c033af08d0bdb79066d6
-
SHA1
a32af51564394ce258f8be78835d7a3d525a5a40
-
SHA256
a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
-
SHA512
9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d
-
SSDEEP
768:O9WBILLEZ9+RiEtelDSN+iV08YbygeWYb1ywPvevEgK/JIZVc6KN:O9cfEtKDs4zb1tYbIwPvenkJIZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:40721
127.0.0.1:50140
Binky812-40721.portmap.host:8848
Binky812-40721.portmap.host:40721
Binky812-40721.portmap.host:50140
hell4563o-50140.portmap.host:8848
hell4563o-50140.portmap.host:40721
hell4563o-50140.portmap.host:50140
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
MinecraftUpdater.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000023b94-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 MinecraftUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4612 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 4600 Client.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe 2972 MinecraftUpdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4600 Client.exe Token: SeDebugPrivilege 2972 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4600 wrote to memory of 3500 4600 Client.exe 82 PID 4600 wrote to memory of 3500 4600 Client.exe 82 PID 4600 wrote to memory of 2416 4600 Client.exe 83 PID 4600 wrote to memory of 2416 4600 Client.exe 83 PID 2416 wrote to memory of 4612 2416 cmd.exe 86 PID 2416 wrote to memory of 4612 2416 cmd.exe 86 PID 3500 wrote to memory of 4992 3500 cmd.exe 87 PID 3500 wrote to memory of 4992 3500 cmd.exe 87 PID 2416 wrote to memory of 2972 2416 cmd.exe 88 PID 2416 wrote to memory of 2972 2416 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8EA3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4612
-
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD557f819d6869384fbd6565b86daa9a1b7
SHA16105359c752e76986f18a57e917ade2fa7ed86fa
SHA256b68b57bff5c9b3fc9c8ccb77558f5224b32842181fcf45a758431eae98ff0183
SHA51265b07c092dc6a1033e13955feba60331d1df7b1f80a489d1369e2495d3da4be4a68b83241cfb44791640d94010cd548cfe74f9c8002db918d684562454776ee7
-
Filesize
48KB
MD5d9b8c518ec57c033af08d0bdb79066d6
SHA1a32af51564394ce258f8be78835d7a3d525a5a40
SHA256a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
SHA5129abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d