Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 08:22
Behavioral task
behavioral1
Sample
PetSim99GUI.exe
Resource
win7-20240903-en
General
-
Target
PetSim99GUI.exe
-
Size
48KB
-
MD5
f5fa1fb705307bd25ca0d0408b8d6684
-
SHA1
31dffff48303612d94d4c10083ade7c6b3b777a3
-
SHA256
1659db1c128cc72c1d5db8ec73a93cc89cc684f00a4c2b83b76fef32af45fe07
-
SHA512
a2803bf7b0662893c1bbc5f2bf876690e57fbf611225cfd968cd04d9c3a005b3d71b27e2df8003ddfa2fcf353691957ea27b119dad88073f8adc9d5114abd246
-
SSDEEP
768:OugvNTjgkH7F7WUHF9pmo2q7cJ/IP8Xjog1VPI0HgmP0i0bc64EU7XoEFmSwBqRb:OugvNTcIb2te3gE0H6dbcjE+z5vdzH
Malware Config
Extracted
asyncrat
0.5.8
Default
letsgetdigging.hopto.org:6606
gwp6EO1O6Isj
-
delay
3
-
install
true
-
install_file
PS99.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e754-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation PetSim99GUI.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 PS99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PS99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PetSim99GUI.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1612 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe 4456 PetSim99GUI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4456 PetSim99GUI.exe Token: SeDebugPrivilege 2492 PS99.exe Token: SeDebugPrivilege 2492 PS99.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4012 4456 PetSim99GUI.exe 83 PID 4456 wrote to memory of 4012 4456 PetSim99GUI.exe 83 PID 4456 wrote to memory of 4012 4456 PetSim99GUI.exe 83 PID 4456 wrote to memory of 4944 4456 PetSim99GUI.exe 85 PID 4456 wrote to memory of 4944 4456 PetSim99GUI.exe 85 PID 4456 wrote to memory of 4944 4456 PetSim99GUI.exe 85 PID 4012 wrote to memory of 2968 4012 cmd.exe 87 PID 4012 wrote to memory of 2968 4012 cmd.exe 87 PID 4012 wrote to memory of 2968 4012 cmd.exe 87 PID 4944 wrote to memory of 1612 4944 cmd.exe 88 PID 4944 wrote to memory of 1612 4944 cmd.exe 88 PID 4944 wrote to memory of 1612 4944 cmd.exe 88 PID 4944 wrote to memory of 2492 4944 cmd.exe 92 PID 4944 wrote to memory of 2492 4944 cmd.exe 92 PID 4944 wrote to memory of 2492 4944 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\PetSim99GUI.exe"C:\Users\Admin\AppData\Local\Temp\PetSim99GUI.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "PS99" /tr '"C:\Users\Admin\AppData\Roaming\PS99.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "PS99" /tr '"C:\Users\Admin\AppData\Roaming\PS99.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp395D.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1612
-
-
C:\Users\Admin\AppData\Roaming\PS99.exe"C:\Users\Admin\AppData\Roaming\PS99.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD517a1c8f8657670121327cc19ccad1868
SHA13bcec43d98dfc0bf4e4800468fb1aed7b1f9d364
SHA25621d4ebd979419dbe8e32b9b8f3c325671cc1342d67fc7a3dc462d5fccf5cdebf
SHA512236d53f1d1d0c21831359f250ffc97fd784896f5d5cd3772a73fc1d1dfcf3dbd7477af1a9ecf23920438bbbcad1c8b91d107912168720304008b55b3b3a33487
-
Filesize
48KB
MD5f5fa1fb705307bd25ca0d0408b8d6684
SHA131dffff48303612d94d4c10083ade7c6b3b777a3
SHA2561659db1c128cc72c1d5db8ec73a93cc89cc684f00a4c2b83b76fef32af45fe07
SHA512a2803bf7b0662893c1bbc5f2bf876690e57fbf611225cfd968cd04d9c3a005b3d71b27e2df8003ddfa2fcf353691957ea27b119dad88073f8adc9d5114abd246