Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 02:50
Static task
static1
Behavioral task
behavioral1
Sample
aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe
Resource
win7-20240903-en
General
-
Target
aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe
-
Size
1000KB
-
MD5
4fc60bc5d5efe63f44146bf1f1bece0d
-
SHA1
b6dfd1478a58caca13ed041995840ea0250cff3e
-
SHA256
aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
-
SHA512
c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8a8hXks:6TvC/MTQYxsWR7a8
Malware Config
Extracted
asyncrat
0.5.8
Default
69.174.100.131:6606
abkZfsCYRZhk
-
delay
10
-
install
false
-
install_file
order.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\teepees.vbs teepees.exe -
Executes dropped EXE 1 IoCs
pid Process 4896 teepees.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023b8e-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4896 set thread context of 216 4896 teepees.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teepees.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4896 teepees.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 4896 teepees.exe 4896 teepees.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 4896 teepees.exe 4896 teepees.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4896 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 82 PID 3096 wrote to memory of 4896 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 82 PID 3096 wrote to memory of 4896 3096 aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe 82 PID 4896 wrote to memory of 216 4896 teepees.exe 83 PID 4896 wrote to memory of 216 4896 teepees.exe 83 PID 4896 wrote to memory of 216 4896 teepees.exe 83 PID 4896 wrote to memory of 216 4896 teepees.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe"C:\Users\Admin\AppData\Local\Temp\aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\exhilaratingly\teepees.exe"C:\Users\Admin\AppData\Local\Temp\aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1.exe"3⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58a4f25859828c5b3fa6c17bbc656f588
SHA1869bd416534ca936fb571e0b34bc193be033be70
SHA256fe0454ad725a63ea72a36738b4cadadb744dd4783c2227efd2168866814929a5
SHA512aef96dcbc861ee48e67d70678f5e59359100cb0c21df14e9355853fb008ce5d250fed10756c29b47d36638a0597fd3182dc6c71aab84f14f82bf32a15c81e7e5
-
Filesize
1000KB
MD54fc60bc5d5efe63f44146bf1f1bece0d
SHA1b6dfd1478a58caca13ed041995840ea0250cff3e
SHA256aab63d73293024e2c135e11929702e1fd5c2497f5885f26e5a6dc6e6409c91d1
SHA512c90a18d004bb03b3d3efddff4c5c60448d4aa9a50f33e8a23e93ac282e927f7f70c788c19982fb5642218baa1a6b04cb2852d447aee767f32e7fa7cf6a7db6ef