Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 17:41
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
General
-
Target
Client.exe
-
Size
48KB
-
MD5
d9b8c518ec57c033af08d0bdb79066d6
-
SHA1
a32af51564394ce258f8be78835d7a3d525a5a40
-
SHA256
a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
-
SHA512
9abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d
-
SSDEEP
768:O9WBILLEZ9+RiEtelDSN+iV08YbygeWYb1ywPvevEgK/JIZVc6KN:O9cfEtKDs4zb1tYbIwPvenkJIZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:40721
127.0.0.1:50140
Binky812-40721.portmap.host:8848
Binky812-40721.portmap.host:40721
Binky812-40721.portmap.host:50140
hell4563o-50140.portmap.host:8848
hell4563o-50140.portmap.host:40721
hell4563o-50140.portmap.host:50140
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
MinecraftUpdater.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9f-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 4148 MinecraftUpdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3720 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4348 Client.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe 4148 MinecraftUpdater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4348 Client.exe Token: SeDebugPrivilege 4148 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4348 wrote to memory of 2616 4348 Client.exe 83 PID 4348 wrote to memory of 2616 4348 Client.exe 83 PID 4348 wrote to memory of 4908 4348 Client.exe 85 PID 4348 wrote to memory of 4908 4348 Client.exe 85 PID 2616 wrote to memory of 4060 2616 cmd.exe 87 PID 2616 wrote to memory of 4060 2616 cmd.exe 87 PID 4908 wrote to memory of 3720 4908 cmd.exe 88 PID 4908 wrote to memory of 3720 4908 cmd.exe 88 PID 4908 wrote to memory of 4148 4908 cmd.exe 90 PID 4908 wrote to memory of 4148 4908 cmd.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MinecraftUpdater" /tr '"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA4CB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3720
-
-
C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\MinecraftUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD59363ed26af4b5c2307633b4ecc8e7c24
SHA143ff97863a29a66dd4ffef3706b07a5642fc0f6f
SHA256c849db7639bdd3a8be71e665723a6503308befd6892f7b012b9f607520f0cc43
SHA512b8163bcbc540621f70eb4be6bbe0ed241e1c372d2e4c48197bc902a3a6e6303d2b069af937a3223ffc9fbc91c41f88e28f2b268e147bcbede7bd6349aa385d2b
-
Filesize
48KB
MD5d9b8c518ec57c033af08d0bdb79066d6
SHA1a32af51564394ce258f8be78835d7a3d525a5a40
SHA256a4fe1b3db7fa16077a2631c87ba51db6477c0ca7444d2b5a78d9a8715ea4c0a7
SHA5129abf1cf1d73f63dbd5c2c36641af68f8b1ee8a13f35b428a49b21d1c7c150a8a91058def9fd98ba6bef99cbb6acbbf81fe396aab6dcfc11acce584f3c38f0c0d