Analysis
-
max time kernel
119s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
Resource
win10v2004-20241007-en
General
-
Target
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
-
Size
544KB
-
MD5
72f75a45c5a2dba67de3552b48b83fb2
-
SHA1
89eaaeeca99407019a85e5c8e950f2d47fe8157b
-
SHA256
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5
-
SHA512
9146102fb862d0b9a8c0fbefabd76e0963d33295defe1a53bc4efaae724583f2552490f97df440d6d09e4c97a3b7c526f42f81a7ea3bc2691a063dfed4779254
-
SSDEEP
6144:hHL4WOLSPswA+PjIMcTCRu9DWoitq2+nVE7pSwqPN+:uWO+PtBPj/cWwpYq+
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
65845562146GZ23
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 2980 PlexMedia.exe -
Loads dropped DLL 1 IoCs
pid Process 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\PlexService = "C:\\Users\\Admin\\AppData\\Roaming\\PlexService\\PlexMedia.exe" cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2980 set thread context of 2852 2980 PlexMedia.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlexMedia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe 2852 RegAsm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 576 wrote to memory of 2980 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 30 PID 576 wrote to memory of 2980 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 30 PID 576 wrote to memory of 2980 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 30 PID 576 wrote to memory of 2980 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 30 PID 576 wrote to memory of 2936 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 31 PID 576 wrote to memory of 2936 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 31 PID 576 wrote to memory of 2936 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 31 PID 576 wrote to memory of 2936 576 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 31 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33 PID 2980 wrote to memory of 2852 2980 PlexMedia.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe"C:\Users\Admin\AppData\Local\Temp\cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5787142f81eb1a9ec3f978ac64e069ee9
SHA1cb5d7aa00da5378f01bcab6ea47e2e1ec75209af
SHA256d1092363d523d099cdbbaefef20dba86d6f8a8b7717b311a7262367f8fa9a303
SHA512d1abd517f1a4a6702787f707efe3fe8c355cafe2664b0a4784c22c7076bc90aaa570292d5e079c12f72ef6ebebb36b0f51215412bb963854b6614332ce447a5d
-
Filesize
544KB
MD54984675b7d1c6dfa793480a6524a99a1
SHA1fb9d77e7681caeabb35f8d815fce0080832e70a3
SHA2566b03a86e25764dbf395720354bfe06b900738381c90bc6762c6bb873b28509dc
SHA5128dceb4817680c14bb4447e2a585953724d62f58973b3c29d2dba26b76890e56f17feb7228a10cd18bced949ffdaccd85e0de633d71ef5c4812a5c6600607ad20