Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 17:41
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
General
-
Target
Client.exe
-
Size
48KB
-
MD5
d9b8c518ec57c033af08d0bdb79066d6
-
SHA1
a32af51564394ce258f8be78835d7a3d525a5a40
-
SHA256
a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
-
SHA512
9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d
-
SSDEEP
768:O9WBILLEZ9+RiEtelDSN+iV08YbygeWYb1ywPvevEgK/JIZVc6KN:O9cfEtKDs4zb1tYbIwPvenkJIZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:40721
127.0.0.1:50140
Binky812-40721.portmap.host:8848
Binky812-40721.portmap.host:40721
Binky812-40721.portmap.host:50140
hell4563o-50140.portmap.host:8848
hell4563o-50140.portmap.host:40721
hell4563o-50140.portmap.host:50140
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
MinecraftUpdater.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002c000000016d70-14.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2788 MinecraftUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2916 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 Client.exe 2448 Client.exe 2448 Client.exe 2448 Client.exe 2448 Client.exe 2448 Client.exe 2448 Client.exe 2448 Client.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe 2788 MinecraftUpdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2448 Client.exe Token: SeDebugPrivilege 2788 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2820 2448 Client.exe 30 PID 2448 wrote to memory of 2820 2448 Client.exe 30 PID 2448 wrote to memory of 2820 2448 Client.exe 30 PID 2448 wrote to memory of 2864 2448 Client.exe 32 PID 2448 wrote to memory of 2864 2448 Client.exe 32 PID 2448 wrote to memory of 2864 2448 Client.exe 32 PID 2820 wrote to memory of 2868 2820 cmd.exe 34 PID 2820 wrote to memory of 2868 2820 cmd.exe 34 PID 2820 wrote to memory of 2868 2820 cmd.exe 34 PID 2864 wrote to memory of 2916 2864 cmd.exe 35 PID 2864 wrote to memory of 2916 2864 cmd.exe 35 PID 2864 wrote to memory of 2916 2864 cmd.exe 35 PID 2864 wrote to memory of 2788 2864 cmd.exe 36 PID 2864 wrote to memory of 2788 2864 cmd.exe 36 PID 2864 wrote to memory of 2788 2864 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp561C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2916
-
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD59296222c41f18be2041066d50a3eedc8
SHA1f10e327107be5eaf43d374e76e7cc9230db45948
SHA2569f6327c814ebc6f3495f58d155410d3f015fd9ffd6a15b40f04f3248053c284d
SHA51261b03ed7fc3e008206525a2b58a975ef53b348dd605d26d5f02f6b3c5d891c24dfe94d9e3394e8162d661489b6d5a4584a4c092dc042270f2d63aa7d349c3534
-
Filesize
48KB
MD5d9b8c518ec57c033af08d0bdb79066d6
SHA1a32af51564394ce258f8be78835d7a3d525a5a40
SHA256a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
SHA5129abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d