Analysis
-
max time kernel
119s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
Resource
win10v2004-20241007-en
General
-
Target
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
-
Size
544KB
-
MD5
4ab04f6128ac78658115bdf49e842030
-
SHA1
bc3895eb9080d2be42c6a3a46f6ac5ecd27b54fd
-
SHA256
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108
-
SHA512
054acca118b1cdbfa081e1558008a17de9b08bbf028922b3c54bc79b79d2df826f78f23e0d242bcc3ca7e533635de5061afd42fe9254eb9b26dc9430b19ec236
-
SSDEEP
6144:hHL4WOLSPswA+PjIMcTCRu9DWoitq2+nVE7pSwqPNq:uWO+PtBPj/cWwpYqq
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
65845562146GZ23
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 596 PlexMedia.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\PlexService = "C:\\Users\\Admin\\AppData\\Roaming\\PlexService\\PlexMedia.exe" 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 596 set thread context of 2860 596 PlexMedia.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlexMedia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe 2860 RegAsm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2204 wrote to memory of 596 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 31 PID 2204 wrote to memory of 596 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 31 PID 2204 wrote to memory of 596 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 31 PID 2204 wrote to memory of 596 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 31 PID 2204 wrote to memory of 2736 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 32 PID 2204 wrote to memory of 2736 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 32 PID 2204 wrote to memory of 2736 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 32 PID 2204 wrote to memory of 2736 2204 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 32 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34 PID 596 wrote to memory of 2860 596 PlexMedia.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe"C:\Users\Admin\AppData\Local\Temp\81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5787142f81eb1a9ec3f978ac64e069ee9
SHA1cb5d7aa00da5378f01bcab6ea47e2e1ec75209af
SHA256d1092363d523d099cdbbaefef20dba86d6f8a8b7717b311a7262367f8fa9a303
SHA512d1abd517f1a4a6702787f707efe3fe8c355cafe2664b0a4784c22c7076bc90aaa570292d5e079c12f72ef6ebebb36b0f51215412bb963854b6614332ce447a5d
-
Filesize
544KB
MD5818251f1cee7c4a217d173cd617c9cdc
SHA15e7defc403c506b4269f0836f133b2794686f88a
SHA2560aada4e15a7ac4b49177ad479d69777bf66149cf3b052d4dadfb0250fbecef47
SHA512359d7a2dab9a8704c869cb63b0d9438e04067311bd97a3b392677cf2e61fe27b97724440b7ff7285a3ef3e90a0cffe9ccd8b0bb3cee70c73dab030c7aba89dee