Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 17:40
General
-
Target
Client.exe
-
Size
48KB
-
MD5
d9b8c518ec57c033af08d0bdb79066d6
-
SHA1
a32af51564394ce258f8be78835d7a3d525a5a40
-
SHA256
a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
-
SHA512
9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d
-
SSDEEP
768:O9WBILLEZ9+RiEtelDSN+iV08YbygeWYb1ywPvevEgK/JIZVc6KN:O9cfEtKDs4zb1tYbIwPvenkJIZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:40721
127.0.0.1:50140
Binky812-40721.portmap.host:8848
Binky812-40721.portmap.host:40721
Binky812-40721.portmap.host:50140
hell4563o-50140.portmap.host:8848
hell4563o-50140.portmap.host:40721
hell4563o-50140.portmap.host:50140
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
MinecraftUpdater.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023c55-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 2 IoCs
pid Process 2752 MinecraftUpdater.exe 4388 MinecraftUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2260 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 1168 Client.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe 2752 MinecraftUpdater.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1168 Client.exe Token: SeDebugPrivilege 2752 MinecraftUpdater.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4664 1168 Client.exe 82 PID 1168 wrote to memory of 4664 1168 Client.exe 82 PID 1168 wrote to memory of 4820 1168 Client.exe 84 PID 1168 wrote to memory of 4820 1168 Client.exe 84 PID 4820 wrote to memory of 2260 4820 cmd.exe 86 PID 4820 wrote to memory of 2260 4820 cmd.exe 86 PID 4664 wrote to memory of 3184 4664 cmd.exe 87 PID 4664 wrote to memory of 3184 4664 cmd.exe 87 PID 4820 wrote to memory of 2752 4820 cmd.exe 88 PID 4820 wrote to memory of 2752 4820 cmd.exe 88 PID 4656 wrote to memory of 1656 4656 msedge.exe 100 PID 4656 wrote to memory of 1656 4656 msedge.exe 100 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 4964 4656 msedge.exe 101 PID 4656 wrote to memory of 2584 4656 msedge.exe 102 PID 4656 wrote to memory of 2584 4656 msedge.exe 102 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 PID 4656 wrote to memory of 1164 4656 msedge.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9DF5.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2260
-
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb228646f8,0x7ffb22864708,0x7ffb228647182⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13486041661969495554,9979528123659699997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4852
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"1⤵
- Executes dropped EXE
PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
5KB
MD5e92ddcd2cbff80e62c19d7d3d176501c
SHA1abb2d8d936d5968d51e192d54b89be887894c210
SHA25617857fc1247a9fee2c060bdbc7cc2a08dfad8135bfc6e4089c533d596203c6e3
SHA51222777f2e5a45f8cddaa68ea3a39957ef99672a29ca1f3166109c86196e389e81099b30a824655cffcbf645e157c94da81aaa3bcf2bb0be3ef56b9d6142648a49
-
Filesize
6KB
MD54d69c50aa46b47de5f50f4be3bdb43de
SHA11bc9ce1a990ca7347a8b83512862714b0dffc4d0
SHA256eb39ffe7821825ecf0051aefa5b0fa8af0b8074cfb9b58d0bc7554570d64d067
SHA512f2302b934dd1f669938b60c3f0467f8a7b555971d4a3eb41c44271ed05d0d59b4408eaf0ba43dacf26a6dc7367d9c60d97cce2c237d42ede70ec746f475c90b3
-
Filesize
10KB
MD5a40cabfbae8a01bb3a2b3c41e69488f8
SHA1dbc741e4e1bfdc0c10088d7190e63a305735d2a3
SHA2563727092a14a0541e6b36f32a6d481a517ea24c9c5a55777084789e6dc00aae0e
SHA512b704e5bd4d385d5483211691b3f67f5a19343d4672f0a38de2d4b54ea4e89db5e3e45f43cbc354492cdf2fcabafeb32aaea76fc0fb7fa89846a953c15400961c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
160B
MD53db4c04ad90d9d617ce1c58b10b1455d
SHA17748686819249d902b0c11b2a612c4920c60312c
SHA256d3c41b37de92624ecc666530aa9464d62315778722779969db1841816b00a592
SHA51281493adec00775db6be4ffdae985abe86d08c2e52c091423c4819b0c8626bce09c9de8d5bb1cc0bef12defd7af7492613577a080cfe8add178fb1f29f6a291b8
-
Filesize
48KB
MD5d9b8c518ec57c033af08d0bdb79066d6
SHA1a32af51564394ce258f8be78835d7a3d525a5a40
SHA256a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
SHA5129abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d