Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
Resource
win10v2004-20241007-en
General
-
Target
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe
-
Size
544KB
-
MD5
4ab04f6128ac78658115bdf49e842030
-
SHA1
bc3895eb9080d2be42c6a3a46f6ac5ecd27b54fd
-
SHA256
81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108
-
SHA512
054acca118b1cdbfa081e1558008a17de9b08bbf028922b3c54bc79b79d2df826f78f23e0d242bcc3ca7e533635de5061afd42fe9254eb9b26dc9430b19ec236
-
SSDEEP
6144:hHL4WOLSPswA+PjIMcTCRu9DWoitq2+nVE7pSwqPNq:uWO+PtBPj/cWwpYqq
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
65845562146GZ23
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe -
Executes dropped EXE 1 IoCs
pid Process 4804 PlexMedia.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PlexService = "C:\\Users\\Admin\\AppData\\Roaming\\PlexService\\PlexMedia.exe" 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 4516 4804 PlexMedia.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PlexMedia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 916 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe 4516 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4804 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 90 PID 4924 wrote to memory of 4804 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 90 PID 4924 wrote to memory of 4804 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 90 PID 4924 wrote to memory of 4044 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 91 PID 4924 wrote to memory of 4044 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 91 PID 4924 wrote to memory of 4044 4924 81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe 91 PID 4044 wrote to memory of 916 4044 cmd.exe 94 PID 4044 wrote to memory of 916 4044 cmd.exe 94 PID 4044 wrote to memory of 916 4044 cmd.exe 94 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100 PID 4804 wrote to memory of 4516 4804 PlexMedia.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe"C:\Users\Admin\AppData\Local\Temp\81cc95ed86dd840e6d4f9381d54a49345d6c329992bb10f578448e68de10b108N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\PlexService\PlexMedia.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1803⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:916
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5787142f81eb1a9ec3f978ac64e069ee9
SHA1cb5d7aa00da5378f01bcab6ea47e2e1ec75209af
SHA256d1092363d523d099cdbbaefef20dba86d6f8a8b7717b311a7262367f8fa9a303
SHA512d1abd517f1a4a6702787f707efe3fe8c355cafe2664b0a4784c22c7076bc90aaa570292d5e079c12f72ef6ebebb36b0f51215412bb963854b6614332ce447a5d
-
Filesize
544KB
MD5c28ff2ba960cc16a850fe449e96bb2c1
SHA1d3843eafc393e584ddd07c472b85ee81e59a8739
SHA2566eed0a444acbf457abaa485c232aa00f62477a11eae27c4037d600c2bbf44e97
SHA5128025a587ae8b16b132d972f27e5435c45226a06521034cb78980721709380a02115096a45bd3a0cc84a32b067866408378afabfc11fa64e690fa289d672129dd