Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 18:21
Static task
static1
Behavioral task
behavioral1
Sample
30Orderpayment-BLQuote_PO385995790.exe
Resource
win7-20240903-en
General
-
Target
30Orderpayment-BLQuote_PO385995790.exe
-
Size
1000KB
-
MD5
4fc60bc5d5efe63f44146bf1f1bece0d
-
SHA1
b6dfd1478a58caca13ed041995840ea0250cff3e
-
SHA256
aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
-
SHA512
c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8a8hXks:6TvC/MTQYxsWR7a8
Malware Config
Extracted
asyncrat
0.5.8
Default
69.174.100.131:6606
abkZfsCYRZhk
-
delay
10
-
install
false
-
install_file
order.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teepees.vbs teepees.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 teepees.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 30Orderpayment-BLQuote_PO385995790.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016d13-8.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2968 2280 teepees.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30Orderpayment-BLQuote_PO385995790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teepees.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2280 teepees.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1048 30Orderpayment-BLQuote_PO385995790.exe 1048 30Orderpayment-BLQuote_PO385995790.exe 2280 teepees.exe 2280 teepees.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1048 30Orderpayment-BLQuote_PO385995790.exe 1048 30Orderpayment-BLQuote_PO385995790.exe 2280 teepees.exe 2280 teepees.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2280 1048 30Orderpayment-BLQuote_PO385995790.exe 28 PID 1048 wrote to memory of 2280 1048 30Orderpayment-BLQuote_PO385995790.exe 28 PID 1048 wrote to memory of 2280 1048 30Orderpayment-BLQuote_PO385995790.exe 28 PID 1048 wrote to memory of 2280 1048 30Orderpayment-BLQuote_PO385995790.exe 28 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29 PID 2280 wrote to memory of 2968 2280 teepees.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\exhilaratingly\teepees.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD54fc60bc5d5efe63f44146bf1f1bece0d
SHA1b6dfd1478a58caca13ed041995840ea0250cff3e
SHA256aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
SHA512c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef