Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 18:59
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20241010-en
General
-
Target
AsyncClient.exe
-
Size
52KB
-
MD5
422b49a2404d8e67c9cd57d46acc97d0
-
SHA1
89ca4038856c67d12d31750a799aa88b08acfb82
-
SHA256
b7a9152f897cb11101d370f3b1ef30d411d4e4116a57ef31d340a58952cf4c1c
-
SHA512
2d9a65aacce93def1829971071b3c02c64555c0e30deca5ff8b12d04202e4b0a5e85cce8c7e61dfad1d966fe027086e7d18e1bf1c23dbe9695f2a8e082fdc77c
-
SSDEEP
1536:Ou4X9Tswb2vOnZH4fAzb03lKuIvLZQ7dqx:Ou4tTswb2vOnZH4fAb038L+7wx
Malware Config
Extracted
asyncrat
0.5.8
Default
x5sql-62870.portmap.host:62870
c2VJpocLoXmn
-
delay
3
-
install
true
-
install_file
Defender.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c4e-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation AsyncClient.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 Defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2004 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe 344 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 344 AsyncClient.exe Token: SeDebugPrivilege 2064 Defender.exe Token: SeDebugPrivilege 2064 Defender.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 344 wrote to memory of 1388 344 AsyncClient.exe 83 PID 344 wrote to memory of 1388 344 AsyncClient.exe 83 PID 344 wrote to memory of 1388 344 AsyncClient.exe 83 PID 344 wrote to memory of 2956 344 AsyncClient.exe 85 PID 344 wrote to memory of 2956 344 AsyncClient.exe 85 PID 344 wrote to memory of 2956 344 AsyncClient.exe 85 PID 2956 wrote to memory of 2004 2956 cmd.exe 87 PID 2956 wrote to memory of 2004 2956 cmd.exe 87 PID 2956 wrote to memory of 2004 2956 cmd.exe 87 PID 1388 wrote to memory of 3668 1388 cmd.exe 88 PID 1388 wrote to memory of 3668 1388 cmd.exe 88 PID 1388 wrote to memory of 3668 1388 cmd.exe 88 PID 2956 wrote to memory of 2064 2956 cmd.exe 89 PID 2956 wrote to memory of 2064 2956 cmd.exe 89 PID 2956 wrote to memory of 2064 2956 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Defender" /tr '"C:\Users\Admin\AppData\Roaming\Defender.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp92F9.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2004
-
-
C:\Users\Admin\AppData\Roaming\Defender.exe"C:\Users\Admin\AppData\Roaming\Defender.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b80655a644349eecd9708bee92f897a
SHA1813987760d0918cef819de7e145f002a01f6ff19
SHA2566bb180a2e75933f9bccb10ce6142b962831985c9c25ff3be5640dc68be28876f
SHA512d38ca07dfd0e7098be89215c7332e952bf0baf5dd192c7b1f0dc35ce4f1cfc00b519a3257b06dc29dd6e558473b7a89f951faba832e5547296b89bb1d127b582
-
Filesize
52KB
MD5422b49a2404d8e67c9cd57d46acc97d0
SHA189ca4038856c67d12d31750a799aa88b08acfb82
SHA256b7a9152f897cb11101d370f3b1ef30d411d4e4116a57ef31d340a58952cf4c1c
SHA5122d9a65aacce93def1829971071b3c02c64555c0e30deca5ff8b12d04202e4b0a5e85cce8c7e61dfad1d966fe027086e7d18e1bf1c23dbe9695f2a8e082fdc77c