Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 02:00
Static task
static1
Behavioral task
behavioral1
Sample
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
Resource
win10v2004-20241007-en
General
-
Target
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
-
Size
6.1MB
-
MD5
192bcd791eac82426c69c1496d9059e5
-
SHA1
036019f9b93f2b2cb80fa251fe769203994e0ae2
-
SHA256
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9
-
SHA512
e774a0a47ec7931a1928ac22f54c65089a340e24cb87fd9b59cf64e8ad203e0bd904da997318ff5c9f0aceddce70dfa415bfae053d97db374adff7cbbe03d3e0
-
SSDEEP
98304:66nonNZnR83jP+0g/7/DXj6Bi/cwIofEbo4P4HwsffoOX1g8:6WATR8zP/gD/DfP7WqfoOq8
Malware Config
Extracted
metasploit
metasploit_stager
5.75.234.8:5050
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot7694252704:AAGfHKTqga3d5HbNfwWi6gV-IxgHteCjH7w/getM
Signatures
-
Asyncrat family
-
Gurcu family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023cbe-87.dat family_asyncrat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation CRInjector.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation build.exe -
Executes dropped EXE 6 IoCs
pid Process 1588 svchost.exe 448 CRInjector.exe 4464 build.exe 4640 cr.exe 396 svchost.exe 2200 svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 raw.githubusercontent.com 14 raw.githubusercontent.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CRInjector.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2844 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4008 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 720 powershell.exe 720 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 720 powershell.exe Token: SeDebugPrivilege 4464 build.exe Token: SeIncreaseQuotaPrivilege 396 svchost.exe Token: SeSecurityPrivilege 396 svchost.exe Token: SeTakeOwnershipPrivilege 396 svchost.exe Token: SeLoadDriverPrivilege 396 svchost.exe Token: SeSystemProfilePrivilege 396 svchost.exe Token: SeSystemtimePrivilege 396 svchost.exe Token: SeProfSingleProcessPrivilege 396 svchost.exe Token: SeIncBasePriorityPrivilege 396 svchost.exe Token: SeCreatePagefilePrivilege 396 svchost.exe Token: SeBackupPrivilege 396 svchost.exe Token: SeRestorePrivilege 396 svchost.exe Token: SeShutdownPrivilege 396 svchost.exe Token: SeDebugPrivilege 396 svchost.exe Token: SeSystemEnvironmentPrivilege 396 svchost.exe Token: SeRemoteShutdownPrivilege 396 svchost.exe Token: SeUndockPrivilege 396 svchost.exe Token: SeManageVolumePrivilege 396 svchost.exe Token: 33 396 svchost.exe Token: 34 396 svchost.exe Token: 35 396 svchost.exe Token: 36 396 svchost.exe Token: SeIncreaseQuotaPrivilege 2200 svchost.exe Token: SeSecurityPrivilege 2200 svchost.exe Token: SeTakeOwnershipPrivilege 2200 svchost.exe Token: SeLoadDriverPrivilege 2200 svchost.exe Token: SeSystemProfilePrivilege 2200 svchost.exe Token: SeSystemtimePrivilege 2200 svchost.exe Token: SeProfSingleProcessPrivilege 2200 svchost.exe Token: SeIncBasePriorityPrivilege 2200 svchost.exe Token: SeCreatePagefilePrivilege 2200 svchost.exe Token: SeBackupPrivilege 2200 svchost.exe Token: SeRestorePrivilege 2200 svchost.exe Token: SeShutdownPrivilege 2200 svchost.exe Token: SeDebugPrivilege 2200 svchost.exe Token: SeSystemEnvironmentPrivilege 2200 svchost.exe Token: SeRemoteShutdownPrivilege 2200 svchost.exe Token: SeUndockPrivilege 2200 svchost.exe Token: SeManageVolumePrivilege 2200 svchost.exe Token: 33 2200 svchost.exe Token: 34 2200 svchost.exe Token: 35 2200 svchost.exe Token: 36 2200 svchost.exe Token: SeDebugPrivilege 4008 taskkill.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1964 wrote to memory of 720 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 82 PID 1964 wrote to memory of 720 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 82 PID 1964 wrote to memory of 720 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 82 PID 1964 wrote to memory of 1588 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 84 PID 1964 wrote to memory of 1588 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 84 PID 1964 wrote to memory of 448 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 85 PID 1964 wrote to memory of 448 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 85 PID 1964 wrote to memory of 448 1964 00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe 85 PID 448 wrote to memory of 4464 448 CRInjector.exe 86 PID 448 wrote to memory of 4464 448 CRInjector.exe 86 PID 448 wrote to memory of 4640 448 CRInjector.exe 87 PID 448 wrote to memory of 4640 448 CRInjector.exe 87 PID 4464 wrote to memory of 396 4464 build.exe 90 PID 4464 wrote to memory of 396 4464 build.exe 90 PID 4464 wrote to memory of 2200 4464 build.exe 94 PID 4464 wrote to memory of 2200 4464 build.exe 94 PID 4464 wrote to memory of 3036 4464 build.exe 100 PID 4464 wrote to memory of 3036 4464 build.exe 100 PID 3036 wrote to memory of 4656 3036 cmd.exe 102 PID 3036 wrote to memory of 4656 3036 cmd.exe 102 PID 3036 wrote to memory of 4008 3036 cmd.exe 103 PID 3036 wrote to memory of 4008 3036 cmd.exe 103 PID 3036 wrote to memory of 2844 3036 cmd.exe 104 PID 3036 wrote to memory of 2844 3036 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe"C:\Users\Admin\AppData\Local\Temp\00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGkAdQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAawByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAdgBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAdgBnACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\CRInjector.exe"C:\Users\Admin\AppData\Local\Temp\CRInjector.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b7693748-7d0c-4089-ac30-7f55204bde2e.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4656
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 44645⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:2844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cr.exe"C:\Users\Admin\AppData\Local\Temp\cr.exe"3⤵
- Executes dropped EXE
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD51d0ddf1ad8614ed2bf87a911d3191880
SHA1137566648a65e7627ca26e8c6fc5712b4b46a54c
SHA256e6426e2874c427878a7aa4b1c771f72cfcf4d97da189c7f1c7eba802d412af96
SHA512d91c1840094ab7cf1686b1df53e55fc7bf45a14da4526f396776d7ac3340c5d6f82cf56464fa87d2f0320a4d060644c463ef3eb110d8ebb355df312a46e25051
-
Filesize
1KB
MD5cb79d387235b54ab495ae5a7b6649bd4
SHA1ecc88e25afdae71a596aa6570eb7efa686343790
SHA256ab6a9f27449f428136f927bd4d7318223ac3b963921b7d8e5953e89b388f1cc6
SHA512faa84bfbc0a308bf821677b6f91afdf86452ca6d8e58667e88957244dc60a0ea79973de874255ca515ff875509f2231d628d974fea661fa56a3c0e970deb6ee3
-
Filesize
2KB
MD59c9213c9c3eb7d794eab240b36a20a92
SHA12794d7e4f32127d7a2281b44dcc01eec747d887c
SHA256667a03fabd69191b61dae3b9ab0ce95be6ba34f3c51db315dd58471783116b99
SHA51278f67db6d8a75b14fac4e4ec913c4e087a9d3c74df2aa9a5d336101b89ad8c939f95dbf5020bf031a1c157e6383a5702494b0624a257026f22a9f72ae09f8847
-
Filesize
690B
MD547da5429c9920236391b4f2bb9822c0e
SHA11ee0f3cfbb10e9076cdf44d45b66538ee402d9f3
SHA256cba5145c15e33ef65ad976c9e039f6c230348d09d8ac3f58e06bba826e6dfae0
SHA512cc5e1af27d24674bac7d23b0c546c1b698dc312d7be75b978ece97e2dfaeba516838aeb1f702cab55c88986b035589757abe38ef29f0257dda32644b54cbb894
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
152B
MD5eddc4e6e5bb60014f81d8521f6a6c327
SHA18afa6e42b795c95a3f83a1d7b241c7d659a372d8
SHA2562212dd1bbfbf737a50ea9c9681ef65afceb2690883358ab14acfdd708851d87f
SHA5124d5942e8ce4028bd8987afea8fbac245b4bbe814e6a4183a919c90dbf49a301bdb564be33e979a334df4fb1f357cbf155f5612baf1f0b9f53cb0895dc1030ac8
-
Filesize
6.1MB
MD52270f282eea0a6f4f9281a9fa22643e8
SHA1809c81c4a672704b281cd4a858cac8a10df26207
SHA256a23477faa272984c38dbf7533dcab6c12395a2a32845910ba1c2cccb6797880d
SHA5124e9e33d34f51ab7940f686733959ce3b06e1fffe1418bd44be60b1f31762aa2f9eccaa8ec7525d496f0c50160c32252008b74f813ddbc1f4b9bc42c64a22416c
-
Filesize
23KB
MD584132b6ff67a2edc0086641076cbe74c
SHA182e5b836b6003635fb2c98a4851789ab093dfd30
SHA2566061e0a08600cb5beb394bffd3ddfecd1699406f6709c7413962cb3881d845cf
SHA5125096ffeb7f071a5811dca9a6088a99cdbb52240177094eaf9ecef9be27c84e46f4f56f197c0badd76f38cc79d5cbca68faea64c8060e589eab5d7e1dc7552548
-
Filesize
7KB
MD5073d78ce1468ecbeedc0afecb126e6cd
SHA15ea217f44b9775effac3c44da2d551294923ae9f
SHA2568bdcaef5756f0e60fdb0fb0c71bff9ff6631b5ad74c3d04614cb09bc83d25c31
SHA51278ffc25e65100488487411582b3d4d732d50ee17daedc84eb1ada44d12a708eb4cf6eb97c9772f74057ae6cc011b4358c454169d87156cd1295a4748162908e0
-
Filesize
63KB
MD567ca41c73d556cc4cfc67fc5b425bbbd
SHA1ada7f812cd581c493630eca83bf38c0f8b32b186
SHA25623d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b
SHA5120dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02