Analysis
-
max time kernel
56s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 03:28
Behavioral task
behavioral1
Sample
FLXTOOLS.exe
Resource
win7-20240729-en
General
-
Target
FLXTOOLS.exe
-
Size
63KB
-
MD5
8b3affb035dc48cb81e416570ee9889a
-
SHA1
bb8b2cd080000afe9b35bf923897acd6df5054f3
-
SHA256
6b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad
-
SHA512
8f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66
-
SSDEEP
768:EpDxI6PfZ778/IC8A+X3GDXKc5t+cV48Jg1+T4nSGGHmDbD0ph0oXrvRXtSuMdph:262ZBmDXHwcKUpUbqh9LdcuMdpqKmY7
Malware Config
Extracted
asyncrat
FLXTOOLS
ohio-darkness.gl.at.ply.gg:13836
-
delay
1
-
install
true
-
install_file
FLXTOOLS.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000018710-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2636 FLXTOOLS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2928 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 FLXTOOLS.exe 2916 FLXTOOLS.exe 2916 FLXTOOLS.exe 2916 FLXTOOLS.exe 2916 FLXTOOLS.exe 2916 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe 2636 FLXTOOLS.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2916 FLXTOOLS.exe Token: SeDebugPrivilege 2916 FLXTOOLS.exe Token: SeDebugPrivilege 2636 FLXTOOLS.exe Token: SeDebugPrivilege 2636 FLXTOOLS.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2816 2916 FLXTOOLS.exe 31 PID 2916 wrote to memory of 2816 2916 FLXTOOLS.exe 31 PID 2916 wrote to memory of 2816 2916 FLXTOOLS.exe 31 PID 2916 wrote to memory of 2720 2916 FLXTOOLS.exe 33 PID 2916 wrote to memory of 2720 2916 FLXTOOLS.exe 33 PID 2916 wrote to memory of 2720 2916 FLXTOOLS.exe 33 PID 2816 wrote to memory of 2852 2816 cmd.exe 35 PID 2816 wrote to memory of 2852 2816 cmd.exe 35 PID 2816 wrote to memory of 2852 2816 cmd.exe 35 PID 2720 wrote to memory of 2928 2720 cmd.exe 36 PID 2720 wrote to memory of 2928 2720 cmd.exe 36 PID 2720 wrote to memory of 2928 2720 cmd.exe 36 PID 2720 wrote to memory of 2636 2720 cmd.exe 37 PID 2720 wrote to memory of 2636 2720 cmd.exe 37 PID 2720 wrote to memory of 2636 2720 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FLXTOOLS.exe"C:\Users\Admin\AppData\Local\Temp\FLXTOOLS.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "FLXTOOLS" /tr '"C:\Users\Admin\AppData\Roaming\FLXTOOLS.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "FLXTOOLS" /tr '"C:\Users\Admin\AppData\Roaming\FLXTOOLS.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2852
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBAB7.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2928
-
-
C:\Users\Admin\AppData\Roaming\FLXTOOLS.exe"C:\Users\Admin\AppData\Roaming\FLXTOOLS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59d6d4f80dddb3fa50c891dea42393b0c
SHA1861ba1ce1ab41ce930e55919405b214dae23fdaf
SHA2567d53d21d0ca225e76165cdaf1777501cfe4f0409b2b5a784c82426f13256ef53
SHA512aa47286d0f86f7a8c4769e791e8554dec1e030743e296d8ec32dcbf1352f0607d07829629981dffe0848d1366082942f7a6d3556adfda83ecbff09d9d1b57379
-
Filesize
63KB
MD58b3affb035dc48cb81e416570ee9889a
SHA1bb8b2cd080000afe9b35bf923897acd6df5054f3
SHA2566b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad
SHA5128f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66