Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/01/2025, 23:14
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10ltsc2021-20250128-en
General
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
f06fbe928d0b97d4aacb1370a258ffb5
-
SHA1
f2d4ca100ae403557d209ca467fa07179802df09
-
SHA256
61872ee6c75b35f80c3279c549d9d3457fb2557166f2628716ee41e36c03f92c
-
SHA512
cd2afec901a8aa643ef4448c814704d5928e6975e547c0af0b366e4855b01e551d191f8dffe1b3b86a424a7e0d308cc0303bf3418358696cba6c74e160497cba
-
SSDEEP
768:wued1TYQZ3VWU1ymhbvmo2qjB4gNaoGGPIzsKZuEK/qR/7Yb8qDdXUVgLZc1yq+4:wued1TYiFhN2poGvJZuEK/kkb8udEWOb
Malware Config
Extracted
asyncrat
0.5.8
WinScript
WmNVpZFGaUkb
-
delay
3
-
install
true
-
install_file
winscript.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/MWg2CxEm
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001a00000002aafd-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3836 winscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 57 IoCs
flow ioc 35 pastebin.com 37 pastebin.com 48 pastebin.com 11 pastebin.com 32 pastebin.com 51 pastebin.com 53 pastebin.com 2 pastebin.com 13 pastebin.com 36 pastebin.com 47 pastebin.com 49 pastebin.com 20 pastebin.com 54 pastebin.com 5 pastebin.com 9 pastebin.com 22 pastebin.com 27 pastebin.com 39 pastebin.com 46 pastebin.com 56 pastebin.com 59 pastebin.com 12 pastebin.com 40 pastebin.com 50 pastebin.com 6 pastebin.com 23 pastebin.com 25 pastebin.com 58 pastebin.com 17 pastebin.com 34 pastebin.com 38 pastebin.com 4 pastebin.com 10 pastebin.com 26 pastebin.com 29 pastebin.com 15 pastebin.com 21 pastebin.com 31 pastebin.com 57 pastebin.com 16 pastebin.com 30 pastebin.com 33 pastebin.com 52 pastebin.com 1 pastebin.com 8 pastebin.com 19 pastebin.com 42 pastebin.com 43 pastebin.com 7 pastebin.com 14 pastebin.com 28 pastebin.com 55 pastebin.com 24 pastebin.com 45 pastebin.com 41 pastebin.com 44 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winscript.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1972 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe 4820 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4820 AsyncClient.exe Token: SeDebugPrivilege 3836 winscript.exe Token: SeDebugPrivilege 3836 winscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3892 4820 AsyncClient.exe 79 PID 4820 wrote to memory of 3892 4820 AsyncClient.exe 79 PID 4820 wrote to memory of 3892 4820 AsyncClient.exe 79 PID 4820 wrote to memory of 4224 4820 AsyncClient.exe 81 PID 4820 wrote to memory of 4224 4820 AsyncClient.exe 81 PID 4820 wrote to memory of 4224 4820 AsyncClient.exe 81 PID 4224 wrote to memory of 1972 4224 cmd.exe 83 PID 4224 wrote to memory of 1972 4224 cmd.exe 83 PID 4224 wrote to memory of 1972 4224 cmd.exe 83 PID 3892 wrote to memory of 4360 3892 cmd.exe 84 PID 3892 wrote to memory of 4360 3892 cmd.exe 84 PID 3892 wrote to memory of 4360 3892 cmd.exe 84 PID 4224 wrote to memory of 3836 4224 cmd.exe 85 PID 4224 wrote to memory of 3836 4224 cmd.exe 85 PID 4224 wrote to memory of 3836 4224 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "winscript" /tr '"C:\Users\Admin\AppData\Roaming\winscript.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "winscript" /tr '"C:\Users\Admin\AppData\Roaming\winscript.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8FEC.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1972
-
-
C:\Users\Admin\AppData\Roaming\winscript.exe"C:\Users\Admin\AppData\Roaming\winscript.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5d8e4a52f9fcbab19d4aabe763bb52e7e
SHA172653d2c5fcbf40c06111a34c3841a65fd79eb77
SHA256e1831cd6ac7c24744916f96c9f2b98cc5f1cd915778ad9fc247e6dc00e6fa910
SHA5120308e297e92bdd1808146d5d52c25e5c0ec0b65436add5b824f04ef837a4bda38719987e38fd9f329116425a2d03e98453d1d1dcf30c515f050c7abec1c73c5c
-
Filesize
47KB
MD5f06fbe928d0b97d4aacb1370a258ffb5
SHA1f2d4ca100ae403557d209ca467fa07179802df09
SHA25661872ee6c75b35f80c3279c549d9d3457fb2557166f2628716ee41e36c03f92c
SHA512cd2afec901a8aa643ef4448c814704d5928e6975e547c0af0b366e4855b01e551d191f8dffe1b3b86a424a7e0d308cc0303bf3418358696cba6c74e160497cba