Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 20:41
Behavioral task
behavioral1
Sample
cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe
Resource
win7-20240903-en
General
-
Target
cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe
-
Size
61KB
-
MD5
a2c0aac6a28d606b4e0e6b9b2c9010d2
-
SHA1
68fd191a7a8f91b8c2dc719a508f45d44c634071
-
SHA256
cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92
-
SHA512
9a340cf7084598fadef7e335b7fd8f7b60e55a83e0d41ff2d3381d190a8c507dd876faf52b4b411054bf4ba768c982707eef3d957d8393eccc3210dfcf6749cc
-
SSDEEP
1536:8F8JsI94/CcIAVBjl03bCPSirh18n3bNEx+:m8JsZCcIAzjl03bCPrh18rNEE
Malware Config
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e748-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 girlshelpgirls3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language girlshelpgirls3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5020 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe Token: SeDebugPrivilege 1656 girlshelpgirls3.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1664 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 86 PID 2988 wrote to memory of 1664 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 86 PID 2988 wrote to memory of 1664 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 86 PID 2988 wrote to memory of 4084 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 88 PID 2988 wrote to memory of 4084 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 88 PID 2988 wrote to memory of 4084 2988 cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe 88 PID 4084 wrote to memory of 5020 4084 cmd.exe 90 PID 4084 wrote to memory of 5020 4084 cmd.exe 90 PID 4084 wrote to memory of 5020 4084 cmd.exe 90 PID 1664 wrote to memory of 4532 1664 cmd.exe 91 PID 1664 wrote to memory of 4532 1664 cmd.exe 91 PID 1664 wrote to memory of 4532 1664 cmd.exe 91 PID 4084 wrote to memory of 1656 4084 cmd.exe 97 PID 4084 wrote to memory of 1656 4084 cmd.exe 97 PID 4084 wrote to memory of 1656 4084 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe"C:\Users\Admin\AppData\Local\Temp\cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "girlshelpgirls3" /tr '"C:\Users\Admin\AppData\Roaming\girlshelpgirls3.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "girlshelpgirls3" /tr '"C:\Users\Admin\AppData\Roaming\girlshelpgirls3.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE445.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5020
-
-
C:\Users\Admin\AppData\Roaming\girlshelpgirls3.exe"C:\Users\Admin\AppData\Roaming\girlshelpgirls3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD51ae40f6c81e256f2f5e4207078a913bf
SHA16aa5195fbfd2aab2b7c929e3683ca87edbeb1ec0
SHA2565a6ada6e3fa94d3f5725dac96e0739a2df64182e25e0ec2c8f30699f184f1906
SHA512b982f8dceb4bc0025767828133e37e5fa9cdafeeebeece6b4e37c5068ca69bc14981b30d6f05dc223f1746c518571c946c078b32e39b4ca453d5b484d5cf4709
-
Filesize
61KB
MD5a2c0aac6a28d606b4e0e6b9b2c9010d2
SHA168fd191a7a8f91b8c2dc719a508f45d44c634071
SHA256cd15ddd8aa45ad1acc1bf1909db65a38ae8581e249eb06c1148b54e4d1db7e92
SHA5129a340cf7084598fadef7e335b7fd8f7b60e55a83e0d41ff2d3381d190a8c507dd876faf52b4b411054bf4ba768c982707eef3d957d8393eccc3210dfcf6749cc