Analysis
-
max time kernel
30s -
max time network
19s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22/01/2025, 16:35
Behavioral task
behavioral1
Sample
AsyncMod.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AsyncMod.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AsyncMod.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
AsyncMod.exe
-
Size
508KB
-
MD5
0b06b95ea006b8bd723acd6cf352fc06
-
SHA1
5607dc185430ec85e5b48cc59257589263d77f19
-
SHA256
b718578e3c137f37d638bc715963c90559f78768092c2dcd59ba73dc6bf1cf7f
-
SHA512
8aff62c083b9c8296f07b0c1ab0885d14353b1528fefe348091ed8494e772156195ad68589a99eaeba0bab9de0672472a9c9398f9102a47e328bc05c48523c6a
-
SSDEEP
12288:jL/KH0hB7a6n4zexn8ILg6qDwoMwIgtoHZ:jL/KszxndwwHZ
Malware Config
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 2076 OneDriveStandaloneAPIMethod.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveStandaloneAPIMethod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncMod.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 412 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2076 OneDriveStandaloneAPIMethod.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2552 AsyncMod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe 2076 OneDriveStandaloneAPIMethod.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 AsyncMod.exe Token: SeDebugPrivilege 2076 OneDriveStandaloneAPIMethod.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1148 2552 AsyncMod.exe 88 PID 2552 wrote to memory of 1148 2552 AsyncMod.exe 88 PID 2552 wrote to memory of 1148 2552 AsyncMod.exe 88 PID 2552 wrote to memory of 1680 2552 AsyncMod.exe 90 PID 2552 wrote to memory of 1680 2552 AsyncMod.exe 90 PID 2552 wrote to memory of 1680 2552 AsyncMod.exe 90 PID 1680 wrote to memory of 2076 1680 cmd.exe 92 PID 1680 wrote to memory of 2076 1680 cmd.exe 92 PID 1680 wrote to memory of 2076 1680 cmd.exe 92 PID 1680 wrote to memory of 412 1680 cmd.exe 94 PID 1680 wrote to memory of 412 1680 cmd.exe 94 PID 1680 wrote to memory of 412 1680 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncMod.exe"C:\Users\Admin\AppData\Local\Temp\AsyncMod.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn OneDriveStandaloneAPIMethod /tr "C:\Users\Admin\AppData\Roaming\Microsoft APIMethod\OneDriveStandaloneAPIMethod.exe" /st 16:41 /du 23:59 /sc daily /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp93A5.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Microsoft APIMethod\OneDriveStandaloneAPIMethod.exe"C:\Users\Admin\AppData\Roaming\Microsoft APIMethod\OneDriveStandaloneAPIMethod.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255B
MD54ec26b47c02efc4ac46828f74107929e
SHA173927c56b72164ee0612abd16999c19a4c2fe72a
SHA2561a6f2fa3fe7a2eda60dd697c160324d693a6f7b814e446f0e5f49c1b00ac50ba
SHA512e55bbb6f31093804a09a215ff36443316208c528e9fa1d8527a4b7416a8f530f2dd159c2a5aed2eca4b683a78c7a2cc8bc6ecc4adc0b22b62146108a13e08798