Analysis
-
max time kernel
139s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung 57698020 nicht korrekt.pdf/Rechnung 57698020 nicht korrekt.pdf_____________________________.exe
Resource
win7-20240903-en
General
-
Target
Rechnung 57698020 nicht korrekt.pdf/Rechnung 57698020 nicht korrekt.pdf_____________________________.exe
-
Size
1.0MB
-
MD5
bb8693c961ba55d38f76a77494a37dd0
-
SHA1
e656b1f51305aeb01fc5ae141e8db999c7a15496
-
SHA256
fce0542aa373126205c1c38161dd9adefc05844e616b9bd0fa49d595e634c407
-
SHA512
00813fd03ead3448adb7c2e0f4fe543229188d09a98199cbdde0d630fb5983de94b75d4182ea0bc6bdfc247e5d13f56e2efdba1ae39ce58ebfd41ce6b7052d9c
-
SSDEEP
24576:+u6J33O0c+JY5UZ+XC0kGso6Fauk1Yi8fMM6WY:Qu0c++OCvkGs9Fa91Yii5Y
Malware Config
Extracted
asyncrat
Default
5.253.247.7:4114
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\incalculability.vbs incalculability.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 incalculability.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000300000001e64b-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4028 set thread context of 4516 4028 incalculability.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rechnung 57698020 nicht korrekt.pdf_____________________________.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incalculability.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4028 incalculability.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4516 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 4028 incalculability.exe 4028 incalculability.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 4028 incalculability.exe 4028 incalculability.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4028 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 89 PID 3340 wrote to memory of 4028 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 89 PID 3340 wrote to memory of 4028 3340 Rechnung 57698020 nicht korrekt.pdf_____________________________.exe 89 PID 4028 wrote to memory of 4516 4028 incalculability.exe 90 PID 4028 wrote to memory of 4516 4028 incalculability.exe 90 PID 4028 wrote to memory of 4516 4028 incalculability.exe 90 PID 4028 wrote to memory of 4516 4028 incalculability.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Idonna\incalculability.exe"C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Rechnung 57698020 nicht korrekt.pdf\Rechnung 57698020 nicht korrekt.pdf_____________________________.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bb8693c961ba55d38f76a77494a37dd0
SHA1e656b1f51305aeb01fc5ae141e8db999c7a15496
SHA256fce0542aa373126205c1c38161dd9adefc05844e616b9bd0fa49d595e634c407
SHA51200813fd03ead3448adb7c2e0f4fe543229188d09a98199cbdde0d630fb5983de94b75d4182ea0bc6bdfc247e5d13f56e2efdba1ae39ce58ebfd41ce6b7052d9c
-
Filesize
63KB
MD5b959eb57f0d08151889bc052328afa4c
SHA18e5b9c3e3aee4ff2613a811fdb5e810532b3fb12
SHA2568b3e0024e388fa04bf6ed06d4d4e8c990e6849d9ba9ddd1ae26efbe77c0b55db
SHA512a6780a7aa945ea0e09bb1de39978a585711288f0611057d52be6e360a2917e4429be08e668fe7fc64430fb3980cf630e2fd66b1a5f04aa6783c597ce498036a4
-
Filesize
29KB
MD5a8d81d9e6fe6dc09c4aa663ae5a000d5
SHA1f645dbb701ae63c5728642f5e0ec6534e3d47dee
SHA256fee6dc1fade4be8273223de5ba6cae4ab2b5e282eb8d09f23fcd59b5d94cdd2b
SHA5125a6eab1a0a7f280458fa8a79630505bff49853800895123d98d1676f723b8a7a4e0c0e93f79c4c3a78f1ca06c01177d2dba43b098d82d5919074cce654e0de11