Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 18:21
Static task
static1
Behavioral task
behavioral1
Sample
30Orderpayment-BLQuote_PO385995790.exe
Resource
win7-20240903-en
General
-
Target
30Orderpayment-BLQuote_PO385995790.exe
-
Size
1000KB
-
MD5
4fc60bc5d5efe63f44146bf1f1bece0d
-
SHA1
b6dfd1478a58caca13ed041995840ea0250cff3e
-
SHA256
aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
-
SHA512
c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8a8hXks:6TvC/MTQYxsWR7a8
Malware Config
Extracted
asyncrat
0.5.8
Default
69.174.100.131:6606
abkZfsCYRZhk
-
delay
10
-
install
false
-
install_file
order.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teepees.vbs teepees.exe -
Executes dropped EXE 1 IoCs
pid Process 2328 teepees.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b85-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 4904 2328 teepees.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30Orderpayment-BLQuote_PO385995790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teepees.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2328 teepees.exe 2328 teepees.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 404 30Orderpayment-BLQuote_PO385995790.exe 404 30Orderpayment-BLQuote_PO385995790.exe 404 30Orderpayment-BLQuote_PO385995790.exe 2328 teepees.exe 2328 teepees.exe 2328 teepees.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 404 30Orderpayment-BLQuote_PO385995790.exe 404 30Orderpayment-BLQuote_PO385995790.exe 404 30Orderpayment-BLQuote_PO385995790.exe 2328 teepees.exe 2328 teepees.exe 2328 teepees.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 404 wrote to memory of 2328 404 30Orderpayment-BLQuote_PO385995790.exe 82 PID 404 wrote to memory of 2328 404 30Orderpayment-BLQuote_PO385995790.exe 82 PID 404 wrote to memory of 2328 404 30Orderpayment-BLQuote_PO385995790.exe 82 PID 2328 wrote to memory of 4904 2328 teepees.exe 83 PID 2328 wrote to memory of 4904 2328 teepees.exe 83 PID 2328 wrote to memory of 4904 2328 teepees.exe 83 PID 2328 wrote to memory of 4904 2328 teepees.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\exhilaratingly\teepees.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\30Orderpayment-BLQuote_PO385995790.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD54fc60bc5d5efe63f44146bf1f1bece0d
SHA1b6dfd1478a58caca13ed041995840ea0250cff3e
SHA256aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
SHA512c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef