Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe
Resource
win7-20241010-en
General
-
Target
cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe
-
Size
28.6MB
-
MD5
9116c5fb992227e6c738307d2de17552
-
SHA1
110741c697079bb7355a3650c5d86ba7c1f908e6
-
SHA256
cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d
-
SHA512
bb127bb1e23dd6da2040dd1c1ee7be1c7b481b2d4636af4f07f1b9449dd445400d431c99b019a86b6ae7d99ffee05f16cb304a99a29006fdff3e36d760c6ea11
-
SSDEEP
393216:esT23WtehI4MPAfu5FFYeQCs88zvwJMO:1aUFbFzr8zvKM
Malware Config
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2760 2880 cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe 30 PID 2880 wrote to memory of 2760 2880 cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe 30 PID 2880 wrote to memory of 2760 2880 cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe 30 PID 2880 wrote to memory of 2760 2880 cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe 30 PID 2760 wrote to memory of 2672 2760 csc.exe 32 PID 2760 wrote to memory of 2672 2760 csc.exe 32 PID 2760 wrote to memory of 2672 2760 csc.exe 32 PID 2760 wrote to memory of 2672 2760 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe"C:\Users\Admin\AppData\Local\Temp\cf2166bcce3d3cd77cd9dc91d33f1d10c084ae31a6adbf542e24a43cdcd2314d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o424cf22\o424cf22.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4C2D.tmp" "c:\Users\Admin\AppData\Local\Temp\o424cf22\CSC7E5BE029192C4690BD246C105EFC9972.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c10a45abd2c009960ea61cbd97ae4c85
SHA1773a0cab5ca5def91b7ecb324cf909cc92d9b095
SHA256493c5cf6325ecfd4d0b210fe87974714c020d40ff6c4cb1d51188b0febb35424
SHA5126b0a58139c434125356f03f8e48bfd39ddf187030b0aba846119203a9ad9fb4e2acd0362073856baf6aa8c5d618df208d0c05776311928d5acd75076bb7383da
-
Filesize
37KB
MD5ec12c769a64d414b878918b078901266
SHA12632187439b29e1766a6b6dc076b010851dcd78e
SHA256600578bb4c925d825ee3eb1353295ee6fe7672dc1260bb6bc17e52dba3b30888
SHA5129155b4008253580e76eafe98917b351a07eadd6d36cfc269a6cd2030e4291623b5751b92ff3d9b7e4a08be57919829e516e958a02b2821e1a1a2ffeafc9fcdc9
-
Filesize
652B
MD580fbbf2955fea0f0469b7cf5f30c0ae4
SHA1035f68e995bbbe7a4d515623ece743493ef4f8f2
SHA256fcb09f1f14084c0a36a81fc6024a366e902d6cb0ea2a6f65d741bfc1249c1ce7
SHA5122f44616870b2402aa97975b0b16c8eccf2eb4040af4718fac98336a7e6591565b1c4a9e7a3f7e86c87d1dc6303a3336a53654fe542c1814c2b178f52385293a5
-
Filesize
69KB
MD589db3c484506b3962f7c8fc952345895
SHA1f19f78cfda729460904f3f30784613eeac4f84aa
SHA256b7477c309b505136d72caefab0814677a5ee09d5ed0a0b4a7ebbc6136a534004
SHA5121e9f00b4389a6ce6ff1c28628ceb4d6fcd68604e8bc64c91ea3ff4f46986a8b384079e02ac2ee6da851bb875467769edca3a57a71962e8feb7d04abe3c76a3fc
-
Filesize
439B
MD5803be05a2d786e18c56a7103ea6112b1
SHA156ca429bb83e3c3e0214f6f8194c75905f649b65
SHA25669420a3e4df2220494dd6ce3ff66d40c2ae5d8b698eec28440ec3f1f16264d44
SHA5126525246b200c1a5f7d70246e9922b538ad5e06da97f002d5fd0e8eda3514dcb8fed1787792cadb0e63613e4815cb6f96fa2055d89d2c8ca629440538b9c7769a