Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 18:06
General
-
Target
3795410aca048dd59d8b52c12cc6a9eda82b6dbcfcbe1e8dff7c5c5b2f07c0b2.exe
-
Size
45KB
-
MD5
35989cfc20c3e8b0a3410afd94965f71
-
SHA1
dd3274bf22db9f9ca345c2c2afd9acb6efe03a34
-
SHA256
3795410aca048dd59d8b52c12cc6a9eda82b6dbcfcbe1e8dff7c5c5b2f07c0b2
-
SHA512
4aaf8fe24ec6d3391ef1f3500a33fb764262bfb79e8f03ea3bc7fdd8cdb79bd2961ee9db2ac82364a1453250d8d05424a5ee60e3e182d1dd0c785788434bc718
-
SSDEEP
768:ju/dRTUo0HQbWUnmjSmo2qMsKjPGagAWOzjbFgX3ipOxubCtSEMcDZLf+:ju/dRTUPE2oKTKTO3bCXSpIuCDdLf+
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
test
C2
192.168.5.7:6606
Mutex
48Sg9Byek4UV
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3795410aca048dd59d8b52c12cc6a9eda82b6dbcfcbe1e8dff7c5c5b2f07c0b2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 408 taskmgr.exe Token: SeSystemProfilePrivilege 408 taskmgr.exe Token: SeCreateGlobalPrivilege 408 taskmgr.exe Token: 33 408 taskmgr.exe Token: SeIncBasePriorityPrivilege 408 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3795410aca048dd59d8b52c12cc6a9eda82b6dbcfcbe1e8dff7c5c5b2f07c0b2.exe"C:\Users\Admin\AppData\Local\Temp\3795410aca048dd59d8b52c12cc6a9eda82b6dbcfcbe1e8dff7c5c5b2f07c0b2.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4952
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2436
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:408