Overview
overview
10Static
static
3new.rar
windows7-x64
1new.rar
windows10-2004-x64
1Drivers.Bu...an.log
windows7-x64
1Drivers.Bu...an.log
windows10-2004-x64
1Drivers.exe
windows7-x64
10Drivers.exe
windows10-2004-x64
10Drivers.exe.recipe
windows7-x64
3Drivers.exe.recipe
windows10-2004-x64
3Drivers.iobj
windows7-x64
3Drivers.iobj
windows10-2004-x64
3Drivers.ipdb
windows7-x64
3Drivers.ipdb
windows10-2004-x64
3Drivers.log
windows7-x64
1Drivers.log
windows10-2004-x64
1Drivers.obj
windows7-x64
3Drivers.obj
windows10-2004-x64
3Drivers.pdb
windows7-x64
3Drivers.pdb
windows10-2004-x64
3Drivers.tl...1.tlog
windows7-x64
3Drivers.tl...1.tlog
windows10-2004-x64
3Drivers.tl...1.tlog
windows7-x64
3Drivers.tl...1.tlog
windows10-2004-x64
3Drivers.tl...1.tlog
windows7-x64
3Drivers.tl...1.tlog
windows10-2004-x64
3Drivers.tl...s.tlog
windows7-x64
3Drivers.tl...s.tlog
windows10-2004-x64
3Drivers.tl...dstate
windows7-x64
3Drivers.tl...dstate
windows10-2004-x64
3Drivers.tl...1.tlog
windows7-x64
3Drivers.tl...1.tlog
windows10-2004-x64
3Drivers.tl...1.tlog
windows7-x64
3Drivers.tl...1.tlog
windows10-2004-x64
3Resubmissions
13/01/2025, 00:07
250113-aet59aymcl 311/01/2025, 23:31
250111-3h1resxjcl 1011/01/2025, 23:29
250111-3g1p2awrgr 10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
new.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
new.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Drivers.Build.CppClean.log
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Drivers.Build.CppClean.log
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Drivers.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Drivers.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Drivers.exe.recipe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Drivers.exe.recipe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Drivers.iobj
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Drivers.iobj
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Drivers.ipdb
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Drivers.ipdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Drivers.log
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Drivers.log
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Drivers.obj
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Drivers.obj
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Drivers.pdb
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Drivers.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Drivers.tlog/CL.command.1.tlog
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Drivers.tlog/CL.command.1.tlog
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Drivers.tlog/CL.read.1.tlog
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Drivers.tlog/CL.read.1.tlog
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Drivers.tlog/CL.write.1.tlog
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Drivers.tlog/CL.write.1.tlog
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Drivers.tlog/Cl.items.tlog
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Drivers.tlog/Cl.items.tlog
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Drivers.tlog/Drivers.lastbuildstate
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Drivers.tlog/Drivers.lastbuildstate
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Drivers.tlog/link.command.1.tlog
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Drivers.tlog/link.command.1.tlog
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Drivers.tlog/link.read.1.tlog
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Drivers.tlog/link.read.1.tlog
Resource
win10v2004-20241007-en
General
-
Target
Drivers.exe
-
Size
21KB
-
MD5
3dbe554d99db5921c2869df9745b32be
-
SHA1
ec61ad96e9848de6e55121c8acd8be6221cc204b
-
SHA256
70b2d5ddb11d58b8a53d0fdc74259241057812e4dfc21a03b937a320e290d822
-
SHA512
6e752d09c1c214bd73f5295eb6ff65eb324d123a57de4ae5516b972f9ec3208e962aca9089f9ef6b91ca3c9394d5c6fd68e806012e9b4aff3f9277b3ee8cd6cc
-
SSDEEP
384:vTRQmNZSqP8MyoXKQmXNQltXpQyXlQx/uoOQtGQmXE9RrA5iXNjd2Ht5rkFJ0Wqx:WlOq2tzclrldjdKkFJCVA3g
Malware Config
Extracted
asyncrat
0.5.8
Default
136.243.175.182:7777
9HD6aMtS9FtK
-
delay
3
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Drivers.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Drivers.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Drivers.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Drivers.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral6/files/0x0007000000023c7c-12.dat family_asyncrat -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Drivers.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Main.exe -
Executes dropped EXE 2 IoCs
pid Process 4760 Main.exe 3472 Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 816 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe 4760 Main.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4760 Main.exe Token: SeDebugPrivilege 3472 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4760 4808 Drivers.exe 83 PID 4808 wrote to memory of 4760 4808 Drivers.exe 83 PID 4808 wrote to memory of 4760 4808 Drivers.exe 83 PID 4760 wrote to memory of 2940 4760 Main.exe 85 PID 4760 wrote to memory of 2940 4760 Main.exe 85 PID 4760 wrote to memory of 2940 4760 Main.exe 85 PID 4760 wrote to memory of 2648 4760 Main.exe 87 PID 4760 wrote to memory of 2648 4760 Main.exe 87 PID 4760 wrote to memory of 2648 4760 Main.exe 87 PID 2940 wrote to memory of 760 2940 cmd.exe 89 PID 2940 wrote to memory of 760 2940 cmd.exe 89 PID 2940 wrote to memory of 760 2940 cmd.exe 89 PID 2648 wrote to memory of 816 2648 cmd.exe 90 PID 2648 wrote to memory of 816 2648 cmd.exe 90 PID 2648 wrote to memory of 816 2648 cmd.exe 90 PID 2648 wrote to memory of 3472 2648 cmd.exe 91 PID 2648 wrote to memory of 3472 2648 cmd.exe 91 PID 2648 wrote to memory of 3472 2648 cmd.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Drivers.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" Drivers.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System Drivers.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableSettingsPage = "1" Drivers.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Drivers.exe"C:\Users\Admin\AppData\Local\Temp\Drivers.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4808 -
C:\Users\Admin\AppData\Roaming\Main.exe"C:\Users\Admin\AppData\Roaming\Main.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Runtime Broker" /tr '"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp97EA.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:816
-
-
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5e7c3b7310da6a7eb8d1f48294fc988e0
SHA110f89622d8afe629517f158e2b320e0bf68e3bee
SHA25612338df34ff2b00867953975f634212e0ac37aafdc6f49b14bb497bb3fc481d8
SHA512f6629ae8ce48ab4558b12ffbbe9e848a8380d88dfeb44e6bcdbe099b51c65d4a2d0aa9dc7c570f7f398e1014c7d04ad1f87368771ca11e4f8a71bface58ed9e1
-
Filesize
45KB
MD53c1178d8a8669ab6be6cd9f7e0cbe003
SHA150899c700563e6e43a81ede481caa69c1e58eb39
SHA256901f4d6b37e9e2d2e17f082579d014a28d362711f3c90a0ca6537fb9412cd6ab
SHA512371c329eebda4d44d816a86a59e281e834c57713b2b5dea4ece025735874024487892c5a422a7857eecf0797b0ffe2dcb166edc4c874c487845550cb195a1d0b