Overview
overview
10Static
static
48a2abab20b...9d.exe
windows7-x64
108a2abab20b...9d.exe
windows10-2004-x64
108a2abab20b...9d.exe
android-10-x64
8a2abab20b...9d.exe
android-13-x64
8a2abab20b...9d.exe
macos-10.15-amd64
8a2abab20b...9d.exe
ubuntu-18.04-amd64
8a2abab20b...9d.exe
debian-9-armhf
8a2abab20b...9d.exe
debian-9-mips
8a2abab20b...9d.exe
debian-9-mipsel
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 11:37
Behavioral task
behavioral1
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral9
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsel-20240611-en
General
-
Target
8a2abab20bf75ac19eaa73be3b09219d.exe
-
Size
455KB
-
MD5
8a2abab20bf75ac19eaa73be3b09219d
-
SHA1
c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
-
SHA256
866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
-
SHA512
e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9
-
SSDEEP
12288:gPn4HHOqpc/Xzm9HtpiuJZoEMkEbSvxJxhF3eggJG:gPn6pc/WHtplJCDkE2/PNz
Malware Config
Extracted
asyncrat
0.5.7B
Default
sbmsbm20.duckdns.org:2020
sbmsbm20.duckdns.org:3040
sbmsbm20.duckdns.org:4040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Acrobat Reader.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Adobe.exe\"," 8a2abab20bf75ac19eaa73be3b09219d.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0003000000013d08-2018.dat Nirsoft -
Executes dropped EXE 5 IoCs
pid Process 6864 AdvancedRun.exe 6932 AdvancedRun.exe 6956 AdvancedRun.exe 6996 AdvancedRun.exe 4400 Acrobat Reader.exe -
Loads dropped DLL 9 IoCs
pid Process 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 6864 AdvancedRun.exe 6864 AdvancedRun.exe 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 6956 AdvancedRun.exe 6956 AdvancedRun.exe 5012 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x0008000000015d76-2057.dat pdf_with_link_action -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 6864 AdvancedRun.exe 6956 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acrobat Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2600 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 6864 AdvancedRun.exe 6864 AdvancedRun.exe 6932 AdvancedRun.exe 6932 AdvancedRun.exe 6956 AdvancedRun.exe 6956 AdvancedRun.exe 6996 AdvancedRun.exe 6996 AdvancedRun.exe 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 7024 8a2abab20bf75ac19eaa73be3b09219d.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2896 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 6864 AdvancedRun.exe Token: SeImpersonatePrivilege 6864 AdvancedRun.exe Token: SeDebugPrivilege 6932 AdvancedRun.exe Token: SeImpersonatePrivilege 6932 AdvancedRun.exe Token: SeDebugPrivilege 6956 AdvancedRun.exe Token: SeImpersonatePrivilege 6956 AdvancedRun.exe Token: SeDebugPrivilege 6996 AdvancedRun.exe Token: SeImpersonatePrivilege 6996 AdvancedRun.exe Token: SeDebugPrivilege 7024 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 4400 Acrobat Reader.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2896 wrote to memory of 6864 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2896 wrote to memory of 6864 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2896 wrote to memory of 6864 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 2896 wrote to memory of 6864 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 30 PID 6864 wrote to memory of 6932 6864 AdvancedRun.exe 31 PID 6864 wrote to memory of 6932 6864 AdvancedRun.exe 31 PID 6864 wrote to memory of 6932 6864 AdvancedRun.exe 31 PID 6864 wrote to memory of 6932 6864 AdvancedRun.exe 31 PID 2896 wrote to memory of 6956 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2896 wrote to memory of 6956 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2896 wrote to memory of 6956 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 2896 wrote to memory of 6956 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 32 PID 6956 wrote to memory of 6996 6956 AdvancedRun.exe 33 PID 6956 wrote to memory of 6996 6956 AdvancedRun.exe 33 PID 6956 wrote to memory of 6996 6956 AdvancedRun.exe 33 PID 6956 wrote to memory of 6996 6956 AdvancedRun.exe 33 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 2896 wrote to memory of 7024 2896 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 7024 wrote to memory of 4884 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 7024 wrote to memory of 4884 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 7024 wrote to memory of 4884 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 7024 wrote to memory of 4884 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 35 PID 7024 wrote to memory of 5012 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 7024 wrote to memory of 5012 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 7024 wrote to memory of 5012 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 7024 wrote to memory of 5012 7024 8a2abab20bf75ac19eaa73be3b09219d.exe 37 PID 4884 wrote to memory of 5068 4884 cmd.exe 39 PID 4884 wrote to memory of 5068 4884 cmd.exe 39 PID 4884 wrote to memory of 5068 4884 cmd.exe 39 PID 4884 wrote to memory of 5068 4884 cmd.exe 39 PID 5012 wrote to memory of 2600 5012 cmd.exe 40 PID 5012 wrote to memory of 2600 5012 cmd.exe 40 PID 5012 wrote to memory of 2600 5012 cmd.exe 40 PID 5012 wrote to memory of 2600 5012 cmd.exe 40 PID 5012 wrote to memory of 4400 5012 cmd.exe 41 PID 5012 wrote to memory of 4400 5012 cmd.exe 41 PID 5012 wrote to memory of 4400 5012 cmd.exe 41 PID 5012 wrote to memory of 4400 5012 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe sh $MOZILLA\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6864 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 68643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6932
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6956 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 69563⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA3BE.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161B
MD5260a5c31f85dc553a14b6256cb92c4d2
SHA17808a42cf6e40536935708cce131f9296a4c1752
SHA256ea5e869da76b8bf11560473f48464216788b04b8a01663a23f7925bab9ea84f4
SHA5125d04ee275f6b1ebf5bd42f74381d16aae0cb577a56d5c5dd4080988363ef60b256adec2db3f14471735551f158550bc0375efd7dd5b375bdc9c1305fdafa89ad
-
Filesize
455KB
MD58a2abab20bf75ac19eaa73be3b09219d
SHA1c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
SHA256866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
SHA512e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a