Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/01/2025, 12:49
Behavioral task
behavioral1
Sample
winjs.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
winjs.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
winjs.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral4
Sample
winjs.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral5
Sample
winjs.exe
Resource
win11-20241007-en
General
-
Target
winjs.exe
-
Size
52KB
-
MD5
623a97bc746f3b530b9f2cb2df7e9145
-
SHA1
1c03bf8e9db2120a1473c9c6924059e75639fa1c
-
SHA256
fe0f056142303bda8538355d81aced08b4792c9787c6060ccad08442e0dacad0
-
SHA512
c0b89b096704a2727bf0242b2d20ed563980e51c4535cac98a9a34d84e89289bda87e3763bedb615f04f72d18a502f48b8ad5276c9e8dc4d1373e1a0bd47ff52
-
SSDEEP
768:YoGDMmILyCe++bidiEuiso8Ybwge9V2COvEgK/Jn2i++++tyVc6KN:Yo0MWSMEzb3mOnkJLyVclN
Malware Config
Extracted
asyncrat
1.0.7
PowerShell
DCSSZZVV
-
delay
1
-
install
true
-
install_file
winws.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/cn4rM5C9
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a00000001227e-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2752 winws.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 28 IoCs
flow ioc 10 pastebin.com 24 pastebin.com 30 pastebin.com 7 pastebin.com 13 pastebin.com 23 pastebin.com 27 pastebin.com 28 pastebin.com 29 pastebin.com 31 pastebin.com 5 pastebin.com 12 pastebin.com 16 pastebin.com 21 pastebin.com 11 pastebin.com 20 pastebin.com 22 pastebin.com 26 pastebin.com 15 pastebin.com 19 pastebin.com 25 pastebin.com 6 pastebin.com 9 pastebin.com 17 pastebin.com 4 pastebin.com 18 pastebin.com 14 pastebin.com 8 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1876 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2408 winjs.exe 2408 winjs.exe 2408 winjs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2408 winjs.exe Token: SeDebugPrivilege 2408 winjs.exe Token: SeDebugPrivilege 2752 winws.exe Token: SeDebugPrivilege 2752 winws.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1228 2408 winjs.exe 30 PID 2408 wrote to memory of 1228 2408 winjs.exe 30 PID 2408 wrote to memory of 1228 2408 winjs.exe 30 PID 2408 wrote to memory of 2176 2408 winjs.exe 32 PID 2408 wrote to memory of 2176 2408 winjs.exe 32 PID 2408 wrote to memory of 2176 2408 winjs.exe 32 PID 2176 wrote to memory of 1876 2176 cmd.exe 34 PID 2176 wrote to memory of 1876 2176 cmd.exe 34 PID 2176 wrote to memory of 1876 2176 cmd.exe 34 PID 1228 wrote to memory of 2892 1228 cmd.exe 35 PID 1228 wrote to memory of 2892 1228 cmd.exe 35 PID 1228 wrote to memory of 2892 1228 cmd.exe 35 PID 2176 wrote to memory of 2752 2176 cmd.exe 37 PID 2176 wrote to memory of 2752 2176 cmd.exe 37 PID 2176 wrote to memory of 2752 2176 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\winjs.exe"C:\Users\Admin\AppData\Local\Temp\winjs.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "winws" /tr '"C:\Users\Admin\AppData\Roaming\winws.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "winws" /tr '"C:\Users\Admin\AppData\Roaming\winws.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2892
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC735.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\winws.exe"C:\Users\Admin\AppData\Roaming\winws.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD580f8f4273c59f172766260c46ecb74e1
SHA1512351298dd78b1ab723739a337023637d0e19c3
SHA256086a65dbd217127a41b2e73e8ebcb247b049783e5ac60c045c78eced4f1fded2
SHA51248171e76c000823b19f5e84db6c89986c6d51344dd3fb8696e74aad0e04a5d6713727b1b937a0880c1ac4dce74a8856b2280276a340243a290aed0e00e81f282
-
Filesize
52KB
MD5623a97bc746f3b530b9f2cb2df7e9145
SHA11c03bf8e9db2120a1473c9c6924059e75639fa1c
SHA256fe0f056142303bda8538355d81aced08b4792c9787c6060ccad08442e0dacad0
SHA512c0b89b096704a2727bf0242b2d20ed563980e51c4535cac98a9a34d84e89289bda87e3763bedb615f04f72d18a502f48b8ad5276c9e8dc4d1373e1a0bd47ff52