Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 21:22
Behavioral task
behavioral1
Sample
tool.exe
Resource
win7-20241010-en
General
-
Target
tool.exe
-
Size
45KB
-
MD5
b84e27e5b6cef684af80c868bf0b4ba0
-
SHA1
213d29cc30c693675911547643112d4c9a6c02d2
-
SHA256
165289612527e1bfad340f7675a701bfe9608a3a4cfbfefe6a662574d5c05f90
-
SHA512
3d5fb00a3793174b8f98e972c9ed7f322d1333dbda79a00676d015532e63eb69449453eda3d7e7de4d3026b49f3816ae4a12c4a2e434893d5aee52d9a3d00813
-
SSDEEP
768:7ugPNTjgkH7F7WUHw9pmo2q7Z0R3+418iZPIXzjbag13ibiWzqrLyXDkZBgkBDZg:7ugPNTcI42B3OiWX3bN1S2UwOzkZCSdg
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Tool.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000f000000023b35-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation tool.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 Tool.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tool.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3152 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe 3708 tool.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3708 tool.exe Token: SeDebugPrivilege 3024 Tool.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3780 3708 tool.exe 88 PID 3708 wrote to memory of 3780 3708 tool.exe 88 PID 3708 wrote to memory of 3780 3708 tool.exe 88 PID 3708 wrote to memory of 5064 3708 tool.exe 90 PID 3708 wrote to memory of 5064 3708 tool.exe 90 PID 3708 wrote to memory of 5064 3708 tool.exe 90 PID 3780 wrote to memory of 2812 3780 cmd.exe 92 PID 3780 wrote to memory of 2812 3780 cmd.exe 92 PID 3780 wrote to memory of 2812 3780 cmd.exe 92 PID 5064 wrote to memory of 3152 5064 cmd.exe 93 PID 5064 wrote to memory of 3152 5064 cmd.exe 93 PID 5064 wrote to memory of 3152 5064 cmd.exe 93 PID 5064 wrote to memory of 3024 5064 cmd.exe 94 PID 5064 wrote to memory of 3024 5064 cmd.exe 94 PID 5064 wrote to memory of 3024 5064 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\tool.exe"C:\Users\Admin\AppData\Local\Temp\tool.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Tool" /tr '"C:\Users\Admin\AppData\Roaming\Tool.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Tool" /tr '"C:\Users\Admin\AppData\Roaming\Tool.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCC39.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3152
-
-
C:\Users\Admin\AppData\Roaming\Tool.exe"C:\Users\Admin\AppData\Roaming\Tool.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5acc9090417037dfa2a55b46ed86e32b8
SHA153fa6fb25fb3e88c24d2027aca6ae492b2800a4d
SHA2562412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b
SHA512d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b
-
Filesize
148B
MD5f7307da0e711085717e7e9853b3e35e6
SHA1394e93ce37a2e7eee08e221b5e0224ab6193d4df
SHA25650e3dcb40877d037373f070e3a04baa4e6d1656bab5099c7cf425c7621334e41
SHA512c1e57f65c7a0c672070d46c995c0549c0de53f3f7c0b94fc9bc61ab65553968645db7841f1655a75d93fe218532f21dab8f05e3b44188f27bff540496c0fd630
-
Filesize
45KB
MD5b84e27e5b6cef684af80c868bf0b4ba0
SHA1213d29cc30c693675911547643112d4c9a6c02d2
SHA256165289612527e1bfad340f7675a701bfe9608a3a4cfbfefe6a662574d5c05f90
SHA5123d5fb00a3793174b8f98e972c9ed7f322d1333dbda79a00676d015532e63eb69449453eda3d7e7de4d3026b49f3816ae4a12c4a2e434893d5aee52d9a3d00813