Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe
Resource
win10v2004-20241007-en
General
-
Target
0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe
-
Size
270KB
-
MD5
7a2b59d94c4497ffd26c841d481ae970
-
SHA1
04a664510872b3a4d04de6161f08196ae08290bc
-
SHA256
0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8ba
-
SHA512
d0b5b442e8221a9b989ac772d474020d5d2ebcb94f198612b5752cf28cf1e106b7b1ad1839f97f9b8ea04300ca94c9cdbc0c48e106d081553de33d3ba2d16196
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sde:WFzDqa86hV6uRRqX1evPlwAEde
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3240-29-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 HiPatchService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2476 set thread context of 3240 2476 HiPatchService.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiPatchService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4696 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe 3240 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2476 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 83 PID 1224 wrote to memory of 2476 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 83 PID 1224 wrote to memory of 2476 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 83 PID 1224 wrote to memory of 5060 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 84 PID 1224 wrote to memory of 5060 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 84 PID 1224 wrote to memory of 5060 1224 0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe 84 PID 5060 wrote to memory of 4696 5060 cmd.exe 86 PID 5060 wrote to memory of 4696 5060 cmd.exe 86 PID 5060 wrote to memory of 4696 5060 cmd.exe 86 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91 PID 2476 wrote to memory of 3240 2476 HiPatchService.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe"C:\Users\Admin\AppData\Local\Temp\0dbe8c82a5aa9e855a45066018b480d786054c810cb611465cc6cfa0bec2e8baN.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1803⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4696
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
270KB
MD5d3cf39eda26ed3459a6d227b8aa4f76d
SHA18c98f6a4049717aa1a2caaca02ff345096f3a814
SHA256514627d8cf1aad3495b7febd444e01e4fcb94d330c551173a7e194d703cec8f2
SHA512166db0e70db57e9cd7660bacd4f2c49504855486d7b857afc765a35f6ca0bcc6ba25ca6480d179f4f533e230d9de896981487d4fc1ad1d6382c641dc3fb1e193