Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 03:29
Static task
static1
Behavioral task
behavioral1
Sample
4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe
Resource
win7-20240903-en
General
-
Target
4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe
-
Size
551KB
-
MD5
acb979b81c2acf8de8925ac44a607e48
-
SHA1
9be1e0bb48c9343c22f292089e4931f0ce739421
-
SHA256
4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7
-
SHA512
41b4e517540a5b2f225f967424c2d009cc85bb6d77398507770b1b474a4ebfd2361f695f380f6c9291cf627e693ba057b4a05c55b52f5c7e5780d37af4c15a01
-
SSDEEP
12288:lxX3xXFdZd9HdkGIwHNLfh2AnX9TML8wHbC708POrXNiH19m9IWIu/rqkR:fzrd9HdkGIONLh2AnXkv8PeUL5WIyp
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.208.158.187:4449
tnybaidkzovl
-
delay
10
-
install
true
-
install_file
NotepadUpdate.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1232 powershell.exe 4064 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation NotepadUpdate.exe -
Executes dropped EXE 2 IoCs
pid Process 4456 NotepadUpdate.exe 3584 NotepadUpdate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2644 set thread context of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 4456 set thread context of 3584 4456 NotepadUpdate.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotepadUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotepadUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 900 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1344 schtasks.exe 632 schtasks.exe 4936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 1232 powershell.exe 1232 powershell.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 4456 NotepadUpdate.exe 4456 NotepadUpdate.exe 4064 powershell.exe 4064 powershell.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe 3584 NotepadUpdate.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe Token: SeDebugPrivilege 4456 NotepadUpdate.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 3584 NotepadUpdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3584 NotepadUpdate.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1232 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 91 PID 2644 wrote to memory of 1232 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 91 PID 2644 wrote to memory of 1232 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 91 PID 2644 wrote to memory of 4936 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 93 PID 2644 wrote to memory of 4936 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 93 PID 2644 wrote to memory of 4936 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 93 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 2644 wrote to memory of 3148 2644 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 95 PID 3148 wrote to memory of 2084 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 99 PID 3148 wrote to memory of 2084 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 99 PID 3148 wrote to memory of 2084 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 99 PID 3148 wrote to memory of 3312 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 101 PID 3148 wrote to memory of 3312 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 101 PID 3148 wrote to memory of 3312 3148 4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe 101 PID 2084 wrote to memory of 1344 2084 cmd.exe 103 PID 2084 wrote to memory of 1344 2084 cmd.exe 103 PID 2084 wrote to memory of 1344 2084 cmd.exe 103 PID 3312 wrote to memory of 900 3312 cmd.exe 104 PID 3312 wrote to memory of 900 3312 cmd.exe 104 PID 3312 wrote to memory of 900 3312 cmd.exe 104 PID 3312 wrote to memory of 4456 3312 cmd.exe 107 PID 3312 wrote to memory of 4456 3312 cmd.exe 107 PID 3312 wrote to memory of 4456 3312 cmd.exe 107 PID 4456 wrote to memory of 4064 4456 NotepadUpdate.exe 109 PID 4456 wrote to memory of 4064 4456 NotepadUpdate.exe 109 PID 4456 wrote to memory of 4064 4456 NotepadUpdate.exe 109 PID 4456 wrote to memory of 632 4456 NotepadUpdate.exe 111 PID 4456 wrote to memory of 632 4456 NotepadUpdate.exe 111 PID 4456 wrote to memory of 632 4456 NotepadUpdate.exe 111 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113 PID 4456 wrote to memory of 3584 4456 NotepadUpdate.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe"C:\Users\Admin\AppData\Local\Temp\4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\efQsxHSLtNUjTi.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\efQsxHSLtNUjTi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC16B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe"C:\Users\Admin\AppData\Local\Temp\4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "NotepadUpdate" /tr '"C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "NotepadUpdate" /tr '"C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEE19.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:900
-
-
C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\efQsxHSLtNUjTi.exe"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\efQsxHSLtNUjTi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3A74.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:632
-
-
C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"C:\Users\Admin\AppData\Roaming\NotepadUpdate.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD52b79b2a4108ec422dbce4f858c77581f
SHA1f72bf4d196e8d3b91427264952b18ad59006c913
SHA25670e64f065afda83ec6cc77e740c9df60ccd6cab08d783a8630ae1c5706742a3c
SHA5120898464de8b4c163ed85f641d36a7977c9fc2330fe4dfed56125ed8dbca09b7beb96cf723c4e144957203408ee2d33f2e758b155a8b6401e54bca53ca78578d3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e3d092844f3519a71cecf717650e747a
SHA149a914e6319737f8d3c810385b08d3312c59ba5c
SHA2564102491c1151c0a000e92e7d6eaa9008e62398b0084b658f4a1f57d8e43a90a3
SHA5126cdfcd62e95847e55b93a67494294c546d881571a5aa0a732b41b4405efb05bae3d75c8f1abfdbc1470e933ad0201fbae5464140223654170a52b70520de1e80
-
Filesize
157B
MD5cd6ef072482e91f8b07aa2e8524641cd
SHA1d93f032d3f09f291d95cd079a8bb2871e5a925fb
SHA25655f2d4c3fd7993226605909c4d8f397f06ee3d8d03d04932d7158956b2ae2afb
SHA5126c1c29db47e106046ea6001a1f332881ba204f102a90cfe55967642bc4978895b0b166d431c6e8c55d3b4537955ca00274671d8af21060dc4d65889f415c459c
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
551KB
MD5acb979b81c2acf8de8925ac44a607e48
SHA19be1e0bb48c9343c22f292089e4931f0ce739421
SHA2564fe449d036c64073e840b18ba90368b895159740ee8596476e42125477a70ed7
SHA51241b4e517540a5b2f225f967424c2d009cc85bb6d77398507770b1b474a4ebfd2361f695f380f6c9291cf627e693ba057b4a05c55b52f5c7e5780d37af4c15a01