Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 22:45
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20241010-en
General
-
Target
Client.exe
-
Size
48KB
-
MD5
fd33a667e7d1b586f0823fe05af333d9
-
SHA1
2afc8d658c78103acee1b9b9fb1e457d83503c6b
-
SHA256
df030ea6fe53e939c3b82d36c80b9523f88523f28ac16d9b2cb53f94b6a2206c
-
SHA512
233922d62da0e3379e3691d8bb377a763ef491e240c75f44556d0d3868d363e8c74c6aefb893c200be4c2c4cd2cbd19c83ab73641bf29f0eeee9f62470c2ea9a
-
SSDEEP
768:pSzTl7ILEWgg+jiAtelDSN+iV08Ybyge0LlLd2XvEgK/JUDVc6KN:pSzXIAtKDs4zb1dpLdwnkJUDVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
went-startup.gl.at.ply.gg:31882
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
Matcha_Fixer.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000001da71-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 3892 Matcha_Fixer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 860 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 2480 Client.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe 3892 Matcha_Fixer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2480 Client.exe Token: SeDebugPrivilege 3892 Matcha_Fixer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3180 2480 Client.exe 88 PID 2480 wrote to memory of 3180 2480 Client.exe 88 PID 2480 wrote to memory of 2776 2480 Client.exe 90 PID 2480 wrote to memory of 2776 2480 Client.exe 90 PID 2776 wrote to memory of 860 2776 cmd.exe 92 PID 2776 wrote to memory of 860 2776 cmd.exe 92 PID 3180 wrote to memory of 1368 3180 cmd.exe 93 PID 3180 wrote to memory of 1368 3180 cmd.exe 93 PID 2776 wrote to memory of 3892 2776 cmd.exe 94 PID 2776 wrote to memory of 3892 2776 cmd.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Matcha_Fixer" /tr '"C:\Users\Admin\AppData\Roaming\Matcha_Fixer.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Matcha_Fixer" /tr '"C:\Users\Admin\AppData\Roaming\Matcha_Fixer.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB323.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:860
-
-
C:\Users\Admin\AppData\Roaming\Matcha_Fixer.exe"C:\Users\Admin\AppData\Roaming\Matcha_Fixer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD55df9174d8a19a718e0953892fef56533
SHA13d0764005ac1bfb18b99e5851a488758442bcb4f
SHA256ce56aaf8fe604575e08f4489d2975b34b151f561bc865819b3cad6e04c013e22
SHA5123064cc6f771e076337347045082f40ef5fa69df521d818fb6f44e045abbe0cec8182c22d0558871af0098fe8639442b859103d579596c618576e0abcd2158746
-
Filesize
48KB
MD5fd33a667e7d1b586f0823fe05af333d9
SHA12afc8d658c78103acee1b9b9fb1e457d83503c6b
SHA256df030ea6fe53e939c3b82d36c80b9523f88523f28ac16d9b2cb53f94b6a2206c
SHA512233922d62da0e3379e3691d8bb377a763ef491e240c75f44556d0d3868d363e8c74c6aefb893c200be4c2c4cd2cbd19c83ab73641bf29f0eeee9f62470c2ea9a