Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 09:20
Behavioral task
behavioral1
Sample
image logger.exe
Resource
win7-20240903-en
General
-
Target
image logger.exe
-
Size
48KB
-
MD5
505210a90b66dceef47778cafebf7f6d
-
SHA1
c593d5f8b4aa53c59d2568ba02e935c6a7650a1e
-
SHA256
4f009430e013267656dca53381d5dbbf0ea5dbb695d87fcf92e8109c836efd58
-
SHA512
992176faa1c037bdf33dd9686b49d3115f457d7b1de8b9fc36b1e59d85ac1a446ba186941c40e5c6b9da88fd27bd746c026cb028a10004c5d27e6e4419e11c23
-
SSDEEP
768:TFWgtBBILDmY1+VxiZRkHigH8Ybug0ABsNqT5uvEgK/JfZVc6KN:TFDak8ZRkRzbR0+sNqtunkJfZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
c2_url_file
https://Pastebin.com/raw/fevFJe98
-
delay
1
-
install
true
-
install_file
image logger.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023c55-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation image logger.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 image logger.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 30 IoCs
flow ioc 39 pastebin.com 46 pastebin.com 51 pastebin.com 52 pastebin.com 66 pastebin.com 22 pastebin.com 50 pastebin.com 61 pastebin.com 45 pastebin.com 47 pastebin.com 27 pastebin.com 44 pastebin.com 54 pastebin.com 62 pastebin.com 69 pastebin.com 76 pastebin.com 16 pastebin.com 55 pastebin.com 59 pastebin.com 64 pastebin.com 28 pastebin.com 67 pastebin.com 70 pastebin.com 15 pastebin.com 53 pastebin.com 63 pastebin.com 20 pastebin.com 65 pastebin.com 68 pastebin.com 43 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4868 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe 3332 image logger.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3332 image logger.exe Token: SeDebugPrivilege 2248 image logger.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3088 3332 image logger.exe 82 PID 3332 wrote to memory of 3088 3332 image logger.exe 82 PID 3332 wrote to memory of 336 3332 image logger.exe 84 PID 3332 wrote to memory of 336 3332 image logger.exe 84 PID 336 wrote to memory of 4868 336 cmd.exe 86 PID 336 wrote to memory of 4868 336 cmd.exe 86 PID 3088 wrote to memory of 2332 3088 cmd.exe 87 PID 3088 wrote to memory of 2332 3088 cmd.exe 87 PID 336 wrote to memory of 2248 336 cmd.exe 91 PID 336 wrote to memory of 2248 336 cmd.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\image logger.exe"C:\Users\Admin\AppData\Local\Temp\image logger.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "image logger" /tr '"C:\Users\Admin\AppData\Roaming\image logger.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "image logger" /tr '"C:\Users\Admin\AppData\Roaming\image logger.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9E72.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4868
-
-
C:\Users\Admin\AppData\Roaming\image logger.exe"C:\Users\Admin\AppData\Roaming\image logger.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
Filesize
156B
MD54ef72001cf8a2615cc4dcdb0af9b2451
SHA16a136b96757c12f32dff3b92605b26c21f2c5b4a
SHA256e1990f8df3c5189e414448f44d43a38e2d16d5ec19ebaa1ccf1d89b2d6380f08
SHA512325829a9cced8e93cf94b4f1b1d177a3dd97aced4d8ac933d223e50994bb4b6db405957e68827711051aa1c5d0ab555575192f859737dcb4c6ae1686189ac213
-
Filesize
48KB
MD5505210a90b66dceef47778cafebf7f6d
SHA1c593d5f8b4aa53c59d2568ba02e935c6a7650a1e
SHA2564f009430e013267656dca53381d5dbbf0ea5dbb695d87fcf92e8109c836efd58
SHA512992176faa1c037bdf33dd9686b49d3115f457d7b1de8b9fc36b1e59d85ac1a446ba186941c40e5c6b9da88fd27bd746c026cb028a10004c5d27e6e4419e11c23