Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 08:16
Behavioral task
behavioral1
Sample
333.exe
Resource
win7-20240903-en
General
-
Target
333.exe
-
Size
65KB
-
MD5
5855063b0ae049847b1d9eeced51a17b
-
SHA1
17cab3ae528d133d8f01bd8ef63b1a92f5cb23da
-
SHA256
62f8cfee286a706856ebe02b176db9169ae776c6609c23016868887ea6b0ab98
-
SHA512
c24970775e8da3f46763824b22fbccdbd2741836cdc3bd9966ef639db8db28cb1b888875da2babab037df6e26e5774f475f55ba10b6f354504185de4d5f4713f
-
SSDEEP
1536:VjTDKqibq1iqHNTcNbRn8smHeC403WAx:VjTDKqibq1iqH6NbRnyt39x
Malware Config
Extracted
asyncrat
A 13
Default
163.172.125.253:333
AsyncMutex_555223
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
A9
Default
windows-cam.casacam.net:800
AsyncMutex_800
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 2220 powershell.exe 3584 powershell.exe 324 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 333.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 948 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4576 set thread context of 2384 4576 333.exe 87 PID 324 set thread context of 4408 324 powershell.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Kills process with taskkill 1 IoCs
pid Process 2648 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4408 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4576 333.exe 2220 powershell.exe 2220 powershell.exe 4576 333.exe 4576 333.exe 324 powershell.exe 324 powershell.exe 2644 powershell.exe 2644 powershell.exe 3584 powershell.exe 3584 powershell.exe 4576 333.exe 4576 333.exe 4408 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4576 333.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 4408 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4576 333.exe 4408 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 4576 wrote to memory of 2384 4576 333.exe 87 PID 2384 wrote to memory of 948 2384 aspnet_compiler.exe 88 PID 2384 wrote to memory of 948 2384 aspnet_compiler.exe 88 PID 2384 wrote to memory of 948 2384 aspnet_compiler.exe 88 PID 948 wrote to memory of 3012 948 cmd.exe 90 PID 948 wrote to memory of 3012 948 cmd.exe 90 PID 948 wrote to memory of 3012 948 cmd.exe 90 PID 4576 wrote to memory of 2220 4576 333.exe 94 PID 4576 wrote to memory of 2220 4576 333.exe 94 PID 4576 wrote to memory of 2220 4576 333.exe 94 PID 2220 wrote to memory of 3336 2220 powershell.exe 97 PID 2220 wrote to memory of 3336 2220 powershell.exe 97 PID 2220 wrote to memory of 3336 2220 powershell.exe 97 PID 2220 wrote to memory of 4752 2220 powershell.exe 98 PID 2220 wrote to memory of 4752 2220 powershell.exe 98 PID 2220 wrote to memory of 4752 2220 powershell.exe 98 PID 4752 wrote to memory of 4724 4752 WScript.exe 99 PID 4752 wrote to memory of 4724 4752 WScript.exe 99 PID 4752 wrote to memory of 4724 4752 WScript.exe 99 PID 4724 wrote to memory of 2648 4724 cmd.exe 101 PID 4724 wrote to memory of 2648 4724 cmd.exe 101 PID 4724 wrote to memory of 2648 4724 cmd.exe 101 PID 4724 wrote to memory of 324 4724 cmd.exe 102 PID 4724 wrote to memory of 324 4724 cmd.exe 102 PID 4724 wrote to memory of 324 4724 cmd.exe 102 PID 3336 wrote to memory of 2644 3336 WScript.exe 103 PID 3336 wrote to memory of 2644 3336 WScript.exe 103 PID 3336 wrote to memory of 2644 3336 WScript.exe 103 PID 2644 wrote to memory of 1756 2644 powershell.exe 105 PID 2644 wrote to memory of 1756 2644 powershell.exe 105 PID 2644 wrote to memory of 1756 2644 powershell.exe 105 PID 1756 wrote to memory of 2500 1756 cmd.exe 106 PID 1756 wrote to memory of 2500 1756 cmd.exe 106 PID 1756 wrote to memory of 2500 1756 cmd.exe 106 PID 4576 wrote to memory of 3584 4576 333.exe 107 PID 4576 wrote to memory of 3584 4576 333.exe 107 PID 4576 wrote to memory of 3584 4576 333.exe 107 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109 PID 324 wrote to memory of 4408 324 powershell.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\333.exe"C:\Users\Admin\AppData\Local\Temp\333.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /delete /tn "Windows Update Service" /f3⤵
- Indicator Removal: Clear Persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "Windows Update Service" /f4⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" –ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\Admin\AppData\Local\Temp\cjwjhs.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Player800\xx.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\Player800\xx.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Player800\xx.bat""5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn Player800 /sc minute /mo 3 /tr "C:\ProgramData\Player800\Cotrl.vbs"6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Player800\Cotrl.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Player800\Cotrl.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powershell.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\Player800\Cotrl.ps15⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" –ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\Admin\AppData\Local\Temp\pqjrbf.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD58413f11ac195ec3844e954ac45538500
SHA13e0586796f1202aca0c5f6af6c14781ec2660521
SHA256e1b4f887211f1a6f6af637d98a26dba4318cf1f8500f5a17f62154d4fcca3225
SHA512b7481dde45b9b4fc83731cb2b51b38c1f971b2f87c948e09f8105ab2b5dd40a16f160e529c9acd38f7f5f36cf3802c33c8e7d42235092d6770bd913d69750118
-
Filesize
172KB
MD5bdefa9dbc66e6c71dea43df83551425a
SHA14e51dc57c3a6990615a84bd3895a20b65d6c917a
SHA2563f3df1ff8cd87d96596cab1c8f2d46f0bb0679cce991a31a9e0d40ed559538aa
SHA5126fc06e71d1b957dfe2235c779f0e82edd74a53ca89ad69d48dda040b015b97fe1c65896cc0f052a1b95cc8f5216b65475f6dc9b076c5677b11041261c8bbf4f6
-
Filesize
633B
MD50704a2ff56715d462324e74432c452c3
SHA1f20f04dc68c2dd4786f24e01ab661c7eb1b0d763
SHA2561adf93db95f147dc8d83a90720f746619897b7a0dd29f76d57e138a8276a52f7
SHA5121d614aaf75a240430071d64b889fe7c08251821fbb7786164cc5de8e339813999c4aff385a363cf074a1562aae1799fdaaea1205aecbda6c22d5d7a8eb404494
-
Filesize
99B
MD5e61680324b182019ff5c19318328af2c
SHA1873bb4a2b81f547d7e96af7630b6a7ec046fadde
SHA256136c19925edd50e80762854c743f995442756a24a8bbe2881eb2dd2b29e60ea1
SHA512b7c032fce7ad525c6dbea1c4652f481597345bc4a44334cc53acdbd3e70f50b60a56e3a6b45d3eca449db2102815eaeef8a892e795a96211cef26ee6c834e1ab
-
Filesize
777B
MD5451b8ecc6199593ff330395bde5724b2
SHA12e64df5e6accca8e497fb16bcbbb4e44c67a6ad3
SHA2566aaa311e7ea5f886df73a5058e44589272b29f5fa4ff8fb497ff6c1694042987
SHA512d3f350a7cd3121940fbeba7cede07ffa49fc66466e28de9beafc1b27d3324e7a732d1cd591f86b45da30d6f61b0e7740b440afd590d20cc2dbb908678c5dc155
-
Filesize
321B
MD508027eeee0542c93662aef98d70095e4
SHA142402c02bf4763fcd6fb0650fc13386f2eae8f9b
SHA2561b9ec007ac8e7de37c61313c5e1b9444df6dc0cd9110553bfa281b13204a646d
SHA512c4e7a17a1dc1f27c91791439d92435a5d750a065508e9539c9af458f21472a7ce45ba0666ef6855a00386e1a75c518d0908b82d929084a1b67ca4c65997a5979
-
Filesize
2KB
MD50774a05ce5ee4c1af7097353c9296c62
SHA1658ff96b111c21c39d7ad5f510fb72f9762114bb
SHA256d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4
SHA512104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994
-
Filesize
17KB
MD551317a613d8eb762e964791643e1430d
SHA1116541a144432cfca6d065f5e7e280dca194fbb4
SHA256aa53657735d9b8f584fbd330e7650940f8cebc9694be82ae592bd05149c7b615
SHA5125db7fc67ad55cccc3c84b52764c79025b89ccd26360718316064a300cf97a69b1a563d87a253eb1535b0882f8f9efccb3895dd7affadac68fb1564f0d961b6a3
-
Filesize
18KB
MD58aabb6ad5f0a9f76a139aa084c62a573
SHA18841e006ee4d3611e3bc3021eba1b5e397b77ada
SHA25611014ae4ac7b58869b69be8136425c49a5662e1657fbb6f3472c470eca1c4653
SHA512f66c999cde5eb921ab561cea1f2d33e9d1b85745c1690b2767a66801c6c0d75d8469b31cf302cbac4d6eb00e635cb93965e76e712b7ec70373bc5a6f75c1b9e9
-
Filesize
11KB
MD5a2bfecdc54ca7a77e32327a49d6ac64b
SHA1ebe5fe2aa05dbd4cddd267e5337d94d38741e949
SHA25620ce19b568baaabc61085366df6580b384f810bc8bc42e7cff852d072d0d28d6
SHA512c1393c1b0205e7d90b9ba73b6461bea269bf2345a871775ff560704c6bee6f6de3ec83c778ee00794cf39802b2d319430f13f4735c0e1f1e26a44c0531aa7682
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
175KB
MD58e3c298bfec35470897383407038f653
SHA1d231448a508649c8aa163bbc9e605bd417c3c0ff
SHA2560ac77c14accd3fe938f7f7465aecf709b218d323b07c04a20e2deff0fc968dff
SHA512cac0dbd264cce5ed6d37c2a54e7b8fe6120ade57e3c72fc1a92608cbc17ce0439b88eb7045c10b7ffc63892653ec19269f875b86f39b3452e36acb4a3dc39a10
-
Filesize
615B
MD5eb620b32fbda807e2d3d85c9ea7e7ecf
SHA13f07ce18947ee7ac4e9395d3d99746edd6055826
SHA256d089f984fe9f0794217ede2c54e90972763fc518b3059e6d28c83c2b5ab793b5
SHA512a2bfd7a501cd258516a978c8d21f2a387e4b955153d1cf76c6ad5f855dc618caffa67122994672dc8f9bd49539144884476aa5182fdcf9b2239d6da477500586