Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2025, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.exe
Resource
win7-20240903-en
General
-
Target
Desktop.exe
-
Size
611KB
-
MD5
0477439dfc65222b446ca4a31c6a5bcd
-
SHA1
17e04cdc917891b25f0f585375e142fcc140403f
-
SHA256
4ce4ae76ccf0787e7fdbc7841c1e9e553831533b39e50c45e35c0f243e1409c8
-
SHA512
1f584a63ce4f3301325c81a920341de79cf3d5fe8d2f4cfffc8b086a5f1b1e2d6443bcfae9067f1a224d46c55a00be85e5e8957b7658ed965ccd27eae670024f
-
SSDEEP
6144:Bz1eXfQ+IqV6EL8aVh3ZqK8DN/ya7cLyMO84+c4Edd47BXAFk/yDwZpLptmZMDlp:qngM8K8P4ElXddah8kyDIZDWgfMAJ
Malware Config
Extracted
asyncrat
Default
6.tcp.ngrok.io:17720
-
delay
1
-
install
true
-
install_file
idk.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000f000000023b59-4.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation infected.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Desktop.exe -
Executes dropped EXE 2 IoCs
pid Process 1200 infected.exe 460 idk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 28 6.tcp.ngrok.io 74 6.tcp.ngrok.io 89 6.tcp.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1368 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe 1200 infected.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1200 infected.exe Token: SeDebugPrivilege 460 idk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1200 4992 Desktop.exe 94 PID 4992 wrote to memory of 1200 4992 Desktop.exe 94 PID 1200 wrote to memory of 3328 1200 infected.exe 96 PID 1200 wrote to memory of 3328 1200 infected.exe 96 PID 1200 wrote to memory of 3568 1200 infected.exe 99 PID 1200 wrote to memory of 3568 1200 infected.exe 99 PID 3328 wrote to memory of 3140 3328 cmd.exe 101 PID 3328 wrote to memory of 3140 3328 cmd.exe 101 PID 3568 wrote to memory of 1368 3568 cmd.exe 102 PID 3568 wrote to memory of 1368 3568 cmd.exe 102 PID 3568 wrote to memory of 460 3568 cmd.exe 103 PID 3568 wrote to memory of 460 3568 cmd.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Desktop.exe"C:\Users\Admin\AppData\Local\Temp\Desktop.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\infected.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\infected.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "idk" /tr '"C:\Users\Admin\AppData\Roaming\idk.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "idk" /tr '"C:\Users\Admin\AppData\Roaming\idk.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:3140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAF1C.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1368
-
-
C:\Users\Admin\AppData\Roaming\idk.exe"C:\Users\Admin\AppData\Roaming\idk.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD52f78d668a4ca22f400e30dfb8b28f47f
SHA198690e10a528b1944633c1dfc7006114020b4d30
SHA2565a360eff532c0d083e250741c0607a4c7a7dff434c16d7b0512965752f6f8522
SHA512b6157efc937711732c95719e204fdf50cbafa112fbd8db74280553b12cc91dc32652a5814ab583205df767d7c879a9abafabe68eb1784b8b3b4bfcb0d2fbca36
-
Filesize
147B
MD5f926cc72bb0329043cd7bdf330076de0
SHA171ed2d555e2384e01d53b06cd5ca34fa4690c1a3
SHA2569979e7677ec0e31fef6ca06d1b8efbe86219babbd1f738b299544c956fdd79cd
SHA5123ac58b3a2d2210281f1cad498729e0a677fe437bd575214324faa2f6f20395c2780747c2026ca170cd3417aaa163dcd6c58daae7341c86b2600162bd37c0f6e3