Overview
overview
10Static
static
48a2abab20b...9d.exe
windows7-x64
108a2abab20b...9d.exe
windows10-2004-x64
108a2abab20b...9d.exe
android-9-x86
8a2abab20b...9d.exe
android-13-x64
8a2abab20b...9d.exe
macos-10.15-amd64
8a2abab20b...9d.exe
ubuntu-18.04-amd64
8a2abab20b...9d.exe
debian-9-armhf
8a2abab20b...9d.exe
debian-9-mips
8a2abab20b...9d.exe
debian-9-mipsel
Analysis
-
max time kernel
104s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 11:38
Behavioral task
behavioral1
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
8a2abab20bf75ac19eaa73be3b09219d.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
8a2abab20bf75ac19eaa73be3b09219d.exe
-
Size
455KB
-
MD5
8a2abab20bf75ac19eaa73be3b09219d
-
SHA1
c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
-
SHA256
866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
-
SHA512
e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9
-
SSDEEP
12288:gPn4HHOqpc/Xzm9HtpiuJZoEMkEbSvxJxhF3eggJG:gPn6pc/WHtplJCDkE2/PNz
Malware Config
Extracted
asyncrat
0.5.7B
Default
sbmsbm20.duckdns.org:2020
sbmsbm20.duckdns.org:3040
sbmsbm20.duckdns.org:4040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Acrobat Reader.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Adobe.exe\"," 8a2abab20bf75ac19eaa73be3b09219d.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x00150000000170f8-2016.dat Nirsoft -
Executes dropped EXE 5 IoCs
pid Process 9516 AdvancedRun.exe 9588 AdvancedRun.exe 9636 AdvancedRun.exe 9668 AdvancedRun.exe 9948 Acrobat Reader.exe -
Loads dropped DLL 9 IoCs
pid Process 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 9516 AdvancedRun.exe 9516 AdvancedRun.exe 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 9636 AdvancedRun.exe 9636 AdvancedRun.exe 9872 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2540 set thread context of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x00080000000186b7-2058.dat pdf_with_link_action -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 9516 AdvancedRun.exe 9636 AdvancedRun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acrobat Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a2abab20bf75ac19eaa73be3b09219d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 9920 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 9516 AdvancedRun.exe 9516 AdvancedRun.exe 9588 AdvancedRun.exe 9588 AdvancedRun.exe 9636 AdvancedRun.exe 9636 AdvancedRun.exe 9668 AdvancedRun.exe 9668 AdvancedRun.exe 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 9700 8a2abab20bf75ac19eaa73be3b09219d.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2540 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 9516 AdvancedRun.exe Token: SeImpersonatePrivilege 9516 AdvancedRun.exe Token: SeDebugPrivilege 9588 AdvancedRun.exe Token: SeImpersonatePrivilege 9588 AdvancedRun.exe Token: SeDebugPrivilege 9636 AdvancedRun.exe Token: SeImpersonatePrivilege 9636 AdvancedRun.exe Token: SeDebugPrivilege 9668 AdvancedRun.exe Token: SeImpersonatePrivilege 9668 AdvancedRun.exe Token: SeDebugPrivilege 9700 8a2abab20bf75ac19eaa73be3b09219d.exe Token: SeDebugPrivilege 9948 Acrobat Reader.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2540 wrote to memory of 9516 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 29 PID 2540 wrote to memory of 9516 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 29 PID 2540 wrote to memory of 9516 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 29 PID 2540 wrote to memory of 9516 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 29 PID 9516 wrote to memory of 9588 9516 AdvancedRun.exe 30 PID 9516 wrote to memory of 9588 9516 AdvancedRun.exe 30 PID 9516 wrote to memory of 9588 9516 AdvancedRun.exe 30 PID 9516 wrote to memory of 9588 9516 AdvancedRun.exe 30 PID 2540 wrote to memory of 9636 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 31 PID 2540 wrote to memory of 9636 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 31 PID 2540 wrote to memory of 9636 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 31 PID 2540 wrote to memory of 9636 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 31 PID 9636 wrote to memory of 9668 9636 AdvancedRun.exe 32 PID 9636 wrote to memory of 9668 9636 AdvancedRun.exe 32 PID 9636 wrote to memory of 9668 9636 AdvancedRun.exe 32 PID 9636 wrote to memory of 9668 9636 AdvancedRun.exe 32 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 2540 wrote to memory of 9700 2540 8a2abab20bf75ac19eaa73be3b09219d.exe 33 PID 9700 wrote to memory of 9828 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 9700 wrote to memory of 9828 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 9700 wrote to memory of 9828 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 9700 wrote to memory of 9828 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 34 PID 9700 wrote to memory of 9872 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 36 PID 9700 wrote to memory of 9872 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 36 PID 9700 wrote to memory of 9872 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 36 PID 9700 wrote to memory of 9872 9700 8a2abab20bf75ac19eaa73be3b09219d.exe 36 PID 9828 wrote to memory of 9912 9828 cmd.exe 38 PID 9828 wrote to memory of 9912 9828 cmd.exe 38 PID 9828 wrote to memory of 9912 9828 cmd.exe 38 PID 9828 wrote to memory of 9912 9828 cmd.exe 38 PID 9872 wrote to memory of 9920 9872 cmd.exe 39 PID 9872 wrote to memory of 9920 9872 cmd.exe 39 PID 9872 wrote to memory of 9920 9872 cmd.exe 39 PID 9872 wrote to memory of 9920 9872 cmd.exe 39 PID 9872 wrote to memory of 9948 9872 cmd.exe 40 PID 9872 wrote to memory of 9948 9872 cmd.exe 40 PID 9872 wrote to memory of 9948 9872 cmd.exe 40 PID 9872 wrote to memory of 9948 9872 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe sh $MOZILLA\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9516 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 95163⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9588
-
-
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9636 -
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 96363⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9668
-
-
-
C:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exeC:\Users\Admin\AppData\Local\Temp\8a2abab20bf75ac19eaa73be3b09219d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:9828 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Acrobat Reader" /tr '"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:9912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE2F0.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:9872 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:9920
-
-
C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"C:\Users\Admin\AppData\Local\Temp\Acrobat Reader.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD58a2abab20bf75ac19eaa73be3b09219d
SHA1c0fa652bb151644bf76b55f3c9d68cb5e8d7faf3
SHA256866ac65940057d6e1a125eda23a12d6743d75e6ff3a74ff6d53debb3fe90a368
SHA512e8842b9f47a5dce906ddca3dfbb608eba660c80364ed0b02b48c33e161df3e95226d713177733e7591cc7eccecb3f48e1a731576a90d6fbda194de98de5495c9
-
Filesize
161B
MD5d3c9b22215d076e41c80e3799e136912
SHA1e8e88370386af4048e4e44b8bd4a2dfe7dc710b1
SHA256063869049b582ddea9e4943d176cf1593fe88175382cb759f7d15ec57b0a1670
SHA5127dff3ebdd3780c60118bd0159e6debd74e3b1d87fa3fa4807711a68741187c872952c742cac74449e01da4a0f5063197b9666421d62e46045ea73b4d6a91338a
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a