Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 16:05
Behavioral task
behavioral1
Sample
netutil.exe
Resource
win7-20241010-en
General
-
Target
netutil.exe
-
Size
45KB
-
MD5
823308911bdc70ead70f3dfa4ef78fbb
-
SHA1
ef9d6123d41288daaffb36389c03f290a08bc33f
-
SHA256
e2fa9ec2b619fcb4e4d40d95ad57ce2d8ba94efc20defba98f19196be75d2a53
-
SHA512
4643ea8fbdfde92e5e8fd00e8d5fb718b4a43e8d902cfb36197d3aa5d50d3b769241ed08bb4961ad148cc9e867ba85d97010cda5c9737f1d989c30da4d22aa9f
-
SSDEEP
768:zuwpFTAY3IQWUe9jqmo2qLN9oSsqHz1OPIqzjbBg83ioGFEkcO5S6IBDZLl:zuwpFTA4/2iKti3q3bu8S7NcO5edLl
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.1.87:16804
uyVUAyFT67eL
-
delay
3
-
install
true
-
install_file
netutil.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000194e6-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3052 netutil.exe -
Loads dropped DLL 1 IoCs
pid Process 2920 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netutil.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2792 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1792 netutil.exe 1792 netutil.exe 1792 netutil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1792 netutil.exe Token: SeDebugPrivilege 3052 netutil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1792 wrote to memory of 484 1792 netutil.exe 32 PID 1792 wrote to memory of 484 1792 netutil.exe 32 PID 1792 wrote to memory of 484 1792 netutil.exe 32 PID 1792 wrote to memory of 484 1792 netutil.exe 32 PID 1792 wrote to memory of 2920 1792 netutil.exe 34 PID 1792 wrote to memory of 2920 1792 netutil.exe 34 PID 1792 wrote to memory of 2920 1792 netutil.exe 34 PID 1792 wrote to memory of 2920 1792 netutil.exe 34 PID 2920 wrote to memory of 2792 2920 cmd.exe 36 PID 2920 wrote to memory of 2792 2920 cmd.exe 36 PID 2920 wrote to memory of 2792 2920 cmd.exe 36 PID 2920 wrote to memory of 2792 2920 cmd.exe 36 PID 484 wrote to memory of 2220 484 cmd.exe 37 PID 484 wrote to memory of 2220 484 cmd.exe 37 PID 484 wrote to memory of 2220 484 cmd.exe 37 PID 484 wrote to memory of 2220 484 cmd.exe 37 PID 2920 wrote to memory of 3052 2920 cmd.exe 38 PID 2920 wrote to memory of 3052 2920 cmd.exe 38 PID 2920 wrote to memory of 3052 2920 cmd.exe 38 PID 2920 wrote to memory of 3052 2920 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\netutil.exe"C:\Users\Admin\AppData\Local\Temp\netutil.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "netutil" /tr '"C:\Users\Admin\AppData\Roaming\netutil.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "netutil" /tr '"C:\Users\Admin\AppData\Roaming\netutil.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD671.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\netutil.exe"C:\Users\Admin\AppData\Roaming\netutil.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5c9e2e2d622d039658bd54174c486599d
SHA160809283d359c07399bfeea0c7dc34e8904fb463
SHA2568b5f4835e3b1e940650200592a72d8873e2cbb2de3175031df6f6113b3a38765
SHA51280e05c0e99cfb2b1bdb630f4d469901b8a6e7585943aac1345303b5e5a5bcd4843360a79dd8f18acb0865cdb0d9d056e59d4ba2a736b8907452763411a0d50be
-
Filesize
45KB
MD5823308911bdc70ead70f3dfa4ef78fbb
SHA1ef9d6123d41288daaffb36389c03f290a08bc33f
SHA256e2fa9ec2b619fcb4e4d40d95ad57ce2d8ba94efc20defba98f19196be75d2a53
SHA5124643ea8fbdfde92e5e8fd00e8d5fb718b4a43e8d902cfb36197d3aa5d50d3b769241ed08bb4961ad148cc9e867ba85d97010cda5c9737f1d989c30da4d22aa9f