Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 05:18
Behavioral task
behavioral1
Sample
Krishna33.exe
Resource
win7-20241010-en
General
-
Target
Krishna33.exe
-
Size
97KB
-
MD5
1ebef0766160be26918574b1645c1848
-
SHA1
c30739eeecb96079bcf6d4f40c94e35abb230e34
-
SHA256
3e664b59ba376749eb9b596b6499bf7edcec5d34382ead80964f9fe92a4c3c83
-
SHA512
01c42bb22a92543a3408c6f420593443357a53915937341b5eaf8563ee775dbdeba7af38e2df9c9cf249a512a5a42c65c4c4d39d100e8a4143e58fd235b85951
-
SSDEEP
1536:ou1a21T3xN2s/tH3bPXSiTbgd2HJ0cYeWQzPhOvVihneW9+e2:ouc6T3xN28tH3bPfIK0wz5OdRSN2
Malware Config
Extracted
asyncrat
0.5.7B
Default
1.tcp.ap.ngrok.io:21049
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b73-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Krishna33.exe -
Executes dropped EXE 1 IoCs
pid Process 4956 chrome.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 14 1.tcp.ap.ngrok.io 42 1.tcp.ap.ngrok.io 57 1.tcp.ap.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Krishna33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 376 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe 4724 Krishna33.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4724 Krishna33.exe Token: SeDebugPrivilege 4956 chrome.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1044 4724 Krishna33.exe 84 PID 4724 wrote to memory of 1044 4724 Krishna33.exe 84 PID 4724 wrote to memory of 1044 4724 Krishna33.exe 84 PID 4724 wrote to memory of 3040 4724 Krishna33.exe 86 PID 4724 wrote to memory of 3040 4724 Krishna33.exe 86 PID 4724 wrote to memory of 3040 4724 Krishna33.exe 86 PID 1044 wrote to memory of 736 1044 cmd.exe 88 PID 1044 wrote to memory of 736 1044 cmd.exe 88 PID 1044 wrote to memory of 736 1044 cmd.exe 88 PID 3040 wrote to memory of 376 3040 cmd.exe 89 PID 3040 wrote to memory of 376 3040 cmd.exe 89 PID 3040 wrote to memory of 376 3040 cmd.exe 89 PID 3040 wrote to memory of 4956 3040 cmd.exe 96 PID 3040 wrote to memory of 4956 3040 cmd.exe 96 PID 3040 wrote to memory of 4956 3040 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krishna33.exe"C:\Users\Admin\AppData\Local\Temp\Krishna33.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "chrome" /tr '"C:\Users\Admin\AppData\Roaming\chrome.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "chrome" /tr '"C:\Users\Admin\AppData\Roaming\chrome.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8F11.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:376
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5caa318c6e33f3a5691b71290629ee316
SHA1e6ce0791c1e0ec1ada5ec6bc143c07c2b1fd1549
SHA256dc6f2eafd193ad0b952ce44357233f3863a97b7aeea727553fb2e8ca8d20fca7
SHA51246683435cb909116a387118ab213e3be86dd35ea6d653441bb53dab4cf9071585ce6d834cccdc54d3ea6d02f0e2f3bb84106a9ba4e7020e8424373f301d595a6
-
Filesize
97KB
MD51ebef0766160be26918574b1645c1848
SHA1c30739eeecb96079bcf6d4f40c94e35abb230e34
SHA2563e664b59ba376749eb9b596b6499bf7edcec5d34382ead80964f9fe92a4c3c83
SHA51201c42bb22a92543a3408c6f420593443357a53915937341b5eaf8563ee775dbdeba7af38e2df9c9cf249a512a5a42c65c4c4d39d100e8a4143e58fd235b85951