Analysis
-
max time kernel
126s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 15:36
Behavioral task
behavioral1
Sample
AsyncClient2.exe
Resource
win7-20241010-en
General
-
Target
AsyncClient2.exe
-
Size
47KB
-
MD5
a9ae63224c966474187616630f021223
-
SHA1
bdc84d7b53a5efa08370018612015fe3acf5b623
-
SHA256
93fff1de1a8e1d6adc48423aa83dd7b7ade28afa1165ee52a9a265d963bdca33
-
SHA512
5c1afb9cf12190d28a6f764002441b060e30bd2dd12451d2c8023b9c2e78d908ed1116d5a69aa40ea12d0c5b6a40806610947c548081ec58bce24d1366b48564
-
SSDEEP
768:QuyxNTAoZjRWUJd9bmo2qLZk3+Zn0BB4PIXLB8H6n0bvEOuSsP7rnmVj6ewb7BDM:QuyxNTAGL2ns0BB9XLBq60bvEAs/n6jR
Malware Config
Extracted
asyncrat
0.5.8
Default
tagol51982-62186.portmap.host:62186
auh8YpVUAiXR
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000001e435-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation AsyncClient2.exe -
Executes dropped EXE 1 IoCs
pid Process 4120 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 960 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe 2808 AsyncClient2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 AsyncClient2.exe Token: SeDebugPrivilege 4120 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2788 2808 AsyncClient2.exe 93 PID 2808 wrote to memory of 2788 2808 AsyncClient2.exe 93 PID 2808 wrote to memory of 2788 2808 AsyncClient2.exe 93 PID 2808 wrote to memory of 4444 2808 AsyncClient2.exe 95 PID 2808 wrote to memory of 4444 2808 AsyncClient2.exe 95 PID 2808 wrote to memory of 4444 2808 AsyncClient2.exe 95 PID 4444 wrote to memory of 960 4444 cmd.exe 97 PID 4444 wrote to memory of 960 4444 cmd.exe 97 PID 4444 wrote to memory of 960 4444 cmd.exe 97 PID 2788 wrote to memory of 2040 2788 cmd.exe 98 PID 2788 wrote to memory of 2040 2788 cmd.exe 98 PID 2788 wrote to memory of 2040 2788 cmd.exe 98 PID 4444 wrote to memory of 4120 4444 cmd.exe 100 PID 4444 wrote to memory of 4120 4444 cmd.exe 100 PID 4444 wrote to memory of 4120 4444 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9C01.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:960
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD59b004f7caa322df216adfd9d1a69d4c3
SHA158adab7baeef9e3ecc17848b2b431d1fc8911942
SHA2563db3788025fa5a4fc30c493d71e5b7248e9c2408117a32925a1d6dc22df22a41
SHA512341b03928840c783d0c3a0e76fc623542e55fad833aba464623de2719bc31b161cd4b2617adb32d805046286d996c1d4100b694effb49c7c388085d1a37a06e5
-
Filesize
47KB
MD5a9ae63224c966474187616630f021223
SHA1bdc84d7b53a5efa08370018612015fe3acf5b623
SHA25693fff1de1a8e1d6adc48423aa83dd7b7ade28afa1165ee52a9a265d963bdca33
SHA5125c1afb9cf12190d28a6f764002441b060e30bd2dd12451d2c8023b9c2e78d908ed1116d5a69aa40ea12d0c5b6a40806610947c548081ec58bce24d1366b48564