Analysis
-
max time kernel
116s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
Resource
win10v2004-20241007-en
General
-
Target
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe
-
Size
544KB
-
MD5
72f75a45c5a2dba67de3552b48b83fb2
-
SHA1
89eaaeeca99407019a85e5c8e950f2d47fe8157b
-
SHA256
cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5
-
SHA512
9146102fb862d0b9a8c0fbefabd76e0963d33295defe1a53bc4efaae724583f2552490f97df440d6d09e4c97a3b7c526f42f81a7ea3bc2691a063dfed4779254
-
SSDEEP
6144:hHL4WOLSPswA+PjIMcTCRu9DWoitq2+nVE7pSwqPN+:uWO+PtBPj/cWwpYq+
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
65845562146GZ23
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe -
Executes dropped EXE 1 IoCs
pid Process 3128 PlexMedia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PlexService = "C:\\Users\\Admin\\AppData\\Roaming\\PlexService\\PlexMedia.exe" cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3128 set thread context of 1500 3128 PlexMedia.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlexMedia.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3948 timeout.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe 1500 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3128 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 84 PID 4416 wrote to memory of 3128 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 84 PID 4416 wrote to memory of 3128 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 84 PID 4416 wrote to memory of 4888 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 85 PID 4416 wrote to memory of 4888 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 85 PID 4416 wrote to memory of 4888 4416 cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe 85 PID 4888 wrote to memory of 3948 4888 cmd.exe 87 PID 4888 wrote to memory of 3948 4888 cmd.exe 87 PID 4888 wrote to memory of 3948 4888 cmd.exe 87 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88 PID 3128 wrote to memory of 1500 3128 PlexMedia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe"C:\Users\Admin\AppData\Local\Temp\cede04b7fea82b617ddf512fe1ede907ec6ea0e88c0fbd416636843abe2f4aa5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1803⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3948
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5787142f81eb1a9ec3f978ac64e069ee9
SHA1cb5d7aa00da5378f01bcab6ea47e2e1ec75209af
SHA256d1092363d523d099cdbbaefef20dba86d6f8a8b7717b311a7262367f8fa9a303
SHA512d1abd517f1a4a6702787f707efe3fe8c355cafe2664b0a4784c22c7076bc90aaa570292d5e079c12f72ef6ebebb36b0f51215412bb963854b6614332ce447a5d
-
Filesize
544KB
MD54d1552795115f53a55d24f5dcf361d21
SHA1adbd9a15e6fae66d05c2cdaafb9e87eea180d152
SHA256c48ef14dbeb86127b7e3c2230670459564f6f2c7e107fd46bac94a4f37e89d1f
SHA512e0a7ffd59df25a0b6252ab3d6e152d8d1dd95767a1c2d581cf2d760701be7324484f341119dae5fd6b5e02a981091f639246ca55ab46916753a3fc2b6235f42e