Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe
Resource
win7-20240729-en
General
-
Target
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe
-
Size
53KB
-
MD5
a61b4683de0819ea1759ab9213ac77d7
-
SHA1
8b96224454aa706139d751816c724a882ac563ed
-
SHA256
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b
-
SHA512
de600e0d26208ecd66e3bb647e9316e2bba2e7b5282c615c603878034f0a5ea6612ca48a82768181fb3fe611659e9f226ad053b7f8970978a7f302ad2dec7f5b
-
SSDEEP
768:bTA6UyXqdGMaZpbWPU/xHn1ftNSWMyOpcHOl2k5j/FBWKP62r9a8tYcFGVc6K:AvzOLbWmHrlMyEc/WFBXFr9aAGVcl
Malware Config
Extracted
asyncrat
1.0.7
Default
WindowsProcess2555AV738w30weweew28378
-
delay
1
-
install
true
-
install_file
WindowsUserPerformanceMonitor.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/hBHVtPrB
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b90-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation TempApp.exe -
Executes dropped EXE 2 IoCs
pid Process 4984 TempApp.exe 4556 WindowsUserPerformanceMonitor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 pastebin.com 23 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3176 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe 4984 TempApp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1404 f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe Token: SeDebugPrivilege 4984 TempApp.exe Token: SeDebugPrivilege 4556 WindowsUserPerformanceMonitor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4984 1404 f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe 83 PID 1404 wrote to memory of 4984 1404 f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe 83 PID 4984 wrote to memory of 3752 4984 TempApp.exe 85 PID 4984 wrote to memory of 3752 4984 TempApp.exe 85 PID 4984 wrote to memory of 4228 4984 TempApp.exe 87 PID 4984 wrote to memory of 4228 4984 TempApp.exe 87 PID 4228 wrote to memory of 3176 4228 cmd.exe 89 PID 4228 wrote to memory of 3176 4228 cmd.exe 89 PID 3752 wrote to memory of 1736 3752 cmd.exe 90 PID 3752 wrote to memory of 1736 3752 cmd.exe 90 PID 4228 wrote to memory of 4556 4228 cmd.exe 91 PID 4228 wrote to memory of 4556 4228 cmd.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe"C:\Users\Admin\AppData\Local\Temp\f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\TempApp.exe"C:\Users\Admin\AppData\Local\Temp\TempApp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsUserPerformanceMonitor" /tr '"C:\Users\Admin\AppData\Roaming\WindowsUserPerformanceMonitor.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsUserPerformanceMonitor" /tr '"C:\Users\Admin\AppData\Roaming\WindowsUserPerformanceMonitor.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:1736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp99CF.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3176
-
-
C:\Users\Admin\AppData\Roaming\WindowsUserPerformanceMonitor.exe"C:\Users\Admin\AppData\Roaming\WindowsUserPerformanceMonitor.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD53d8aafc8ab36b03c90e925e72eb78efb
SHA103d22f31f27e2de64b6c52f3073d711a0f726035
SHA256b9161b198d8ba4e0c6497e1086b22032b48f851a662e7e46fbc926d57db73e4d
SHA512f316649f4cd3fb778fb58f20ecd32ecc293ae19e7b59ee7182a99635abe3dd6043140a854fa11166ab06a5b24f2e8718e5fc55d30cd53b67497cbdccc6b6375b
-
Filesize
173B
MD52d879cb812165ba620226904c1b8327b
SHA1bbaff4b3049ea08b376289d61637a0bb0b063797
SHA256010dc9c69a4e569b3dccc91468d75e4a98c062c283c469eea16b6c43d0a84dff
SHA5129dfca4039f2122db17d09eec1e0eb4ea1232518c7d04123f4895077563e7305174e865ed981efc4a91b2053b94e8847039d1a0ca0ad185463502c1104e829ba8