Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 07:47
Behavioral task
behavioral1
Sample
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe
Resource
win7-20240903-en
General
-
Target
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe
-
Size
63KB
-
MD5
75e5c5859589d7221d6997aa87e84d2c
-
SHA1
288d747cdddb07eb42da0601987fbefef67a211b
-
SHA256
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673
-
SHA512
f00832876c69e2fe52389ceeedd3e8039b276b21e4e6cfefacf6556398772d6209a4a535f3d12319a7dd010c65edddbdf46597f1affed0a6547f2ada272c7532
-
SSDEEP
1536:lQXDLK88Wi6RHWtUbCh9MkKxbYHuodpqKmY7:l02mi6R2tUbC4ylGz
Malware Config
Extracted
asyncrat
Default
35.159.113.6:1337
-
delay
1
-
install
true
-
install_file
DefenderControlWeb.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00090000000120d6-16.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2852 DefenderControlWeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2256 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe Token: SeDebugPrivilege 2852 DefenderControlWeb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3032 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 3028 wrote to memory of 3032 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 3028 wrote to memory of 3032 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 3028 wrote to memory of 2320 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 3028 wrote to memory of 2320 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 3028 wrote to memory of 2320 3028 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 3032 wrote to memory of 2312 3032 cmd.exe 34 PID 3032 wrote to memory of 2312 3032 cmd.exe 34 PID 3032 wrote to memory of 2312 3032 cmd.exe 34 PID 2320 wrote to memory of 2256 2320 cmd.exe 35 PID 2320 wrote to memory of 2256 2320 cmd.exe 35 PID 2320 wrote to memory of 2256 2320 cmd.exe 35 PID 2320 wrote to memory of 2852 2320 cmd.exe 36 PID 2320 wrote to memory of 2852 2320 cmd.exe 36 PID 2320 wrote to memory of 2852 2320 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe"C:\Users\Admin\AppData\Local\Temp\e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "DefenderControlWeb" /tr '"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "DefenderControlWeb" /tr '"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA7D3.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD575e5c5859589d7221d6997aa87e84d2c
SHA1288d747cdddb07eb42da0601987fbefef67a211b
SHA256e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673
SHA512f00832876c69e2fe52389ceeedd3e8039b276b21e4e6cfefacf6556398772d6209a4a535f3d12319a7dd010c65edddbdf46597f1affed0a6547f2ada272c7532
-
Filesize
165B
MD5c5ea571a78568086c7063b89f159edbb
SHA179b0fe0fe04d432ad3e28e60aa936e21b89816b6
SHA2560dec98e64ef2b650d400eaaed277ed058dfa7ae54ed9ecdb05e64965f830cbae
SHA51221a56d32c50eccc51f60e4ff1eb594a0247f0e2fce25195a2ec9771fbc8b8347de40b1695229d532531decf26ed875005bc3c121ac2bb8358f43935a8eeae5b5