Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 07:56
Behavioral task
behavioral1
Sample
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe
Resource
win7-20240903-en
General
-
Target
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe
-
Size
63KB
-
MD5
75e5c5859589d7221d6997aa87e84d2c
-
SHA1
288d747cdddb07eb42da0601987fbefef67a211b
-
SHA256
e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673
-
SHA512
f00832876c69e2fe52389ceeedd3e8039b276b21e4e6cfefacf6556398772d6209a4a535f3d12319a7dd010c65edddbdf46597f1affed0a6547f2ada272c7532
-
SSDEEP
1536:lQXDLK88Wi6RHWtUbCh9MkKxbYHuodpqKmY7:l02mi6R2tUbC4ylGz
Malware Config
Extracted
asyncrat
Default
35.159.113.6:1337
-
delay
1
-
install
true
-
install_file
DefenderControlWeb.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2552 DefenderControlWeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2748 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe Token: SeDebugPrivilege 2552 DefenderControlWeb.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2844 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 2620 wrote to memory of 2844 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 2620 wrote to memory of 2844 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 30 PID 2620 wrote to memory of 2800 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 2620 wrote to memory of 2800 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 2620 wrote to memory of 2800 2620 e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe 32 PID 2844 wrote to memory of 2780 2844 cmd.exe 34 PID 2844 wrote to memory of 2780 2844 cmd.exe 34 PID 2844 wrote to memory of 2780 2844 cmd.exe 34 PID 2800 wrote to memory of 2748 2800 cmd.exe 35 PID 2800 wrote to memory of 2748 2800 cmd.exe 35 PID 2800 wrote to memory of 2748 2800 cmd.exe 35 PID 2800 wrote to memory of 2552 2800 cmd.exe 36 PID 2800 wrote to memory of 2552 2800 cmd.exe 36 PID 2800 wrote to memory of 2552 2800 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe"C:\Users\Admin\AppData\Local\Temp\e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "DefenderControlWeb" /tr '"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "DefenderControlWeb" /tr '"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5541.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"C:\Users\Admin\AppData\Local\Temp\DefenderControlWeb.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD575e5c5859589d7221d6997aa87e84d2c
SHA1288d747cdddb07eb42da0601987fbefef67a211b
SHA256e2c831fb09b6585f06e3ac919ca50d9aacae0891be133354982c997410fb8673
SHA512f00832876c69e2fe52389ceeedd3e8039b276b21e4e6cfefacf6556398772d6209a4a535f3d12319a7dd010c65edddbdf46597f1affed0a6547f2ada272c7532
-
Filesize
165B
MD55c3c8fa55edc1dd9a5db882077511b92
SHA1c65ec4bd1f98f72e04dcdbba4ffae806f6fc6668
SHA256fa067a00f3765859893770dee2912e51fb246307e9cf1ec8f3793ca8bfabf357
SHA5127470983afe8cc009a89126ebf1133893ecfce1bbf545dee85ad9a9388bcb76f3d78448d8610b43858d1127f60da42bc23f6a35e97ddb017252c5d6da33e22b0c