Analysis
-
max time kernel
73s -
max time network
87s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2025, 21:20
Errors
General
-
Target
h.exe
-
Size
47KB
-
MD5
03424c597882d3daa52bf027798b2e0b
-
SHA1
2d7fdd69b06226b6cdce05bc0820ad286b3e6b14
-
SHA256
47ba146b7f2fb94a4793f6fe302b53cab7bd6bbe021b57b389a340a060ff8d7a
-
SHA512
26a24e11ca9d7e26b44a74ef78108eb2a6aef071380703ab85b0b2ea92a719f4cd2ddbbb590a2837c18ac1cf33000872df242c4c263032d0df28ba955ae7ec90
-
SSDEEP
768:12uwpFTAY3IQWUe9jqmo2qL2Rxd6jnFiDOPIbSjZ60buZ3adb2g1+bWx3OXWQBDw:12uwpFTA4/256T03bqlbuZ3BXykmGdEx
Malware Config
Extracted
asyncrat
0.5.8
Default
77.100.63.251:5631
SXPNYKU9S8ry
-
delay
3
-
install
true
-
install_file
Disc367.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001e00000002ad4b-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1164 Disc367.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Disc367.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2136 timeout.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1580 h.exe 1164 Disc367.exe 1164 Disc367.exe 1164 Disc367.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1580 h.exe Token: SeDebugPrivilege 1164 Disc367.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3472 1580 h.exe 78 PID 1580 wrote to memory of 3472 1580 h.exe 78 PID 1580 wrote to memory of 3472 1580 h.exe 78 PID 1580 wrote to memory of 4492 1580 h.exe 80 PID 1580 wrote to memory of 4492 1580 h.exe 80 PID 1580 wrote to memory of 4492 1580 h.exe 80 PID 3472 wrote to memory of 1860 3472 cmd.exe 82 PID 3472 wrote to memory of 1860 3472 cmd.exe 82 PID 3472 wrote to memory of 1860 3472 cmd.exe 82 PID 4492 wrote to memory of 2136 4492 cmd.exe 83 PID 4492 wrote to memory of 2136 4492 cmd.exe 83 PID 4492 wrote to memory of 2136 4492 cmd.exe 83 PID 4492 wrote to memory of 1164 4492 cmd.exe 84 PID 4492 wrote to memory of 1164 4492 cmd.exe 84 PID 4492 wrote to memory of 1164 4492 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\h.exe"C:\Users\Admin\AppData\Local\Temp\h.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Disc367" /tr '"C:\Users\Admin\AppData\Roaming\Disc367.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Disc367" /tr '"C:\Users\Admin\AppData\Roaming\Disc367.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9C30.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2136
-
-
C:\Users\Admin\AppData\Roaming\Disc367.exe"C:\Users\Admin\AppData\Roaming\Disc367.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\f74660e1-1c03-45d5-9746-6127e2b08e1a.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
151B
MD56f44a97dadc728bb01b8037bbc87e7d4
SHA114bb082017c1f55705258bf7ca34089cac46528b
SHA25627664f1ed55d63aa29de04fe65a1c3c2e8b3121ff32a1212970a1eb2917a80e1
SHA51200c3c09dfbc9120ab8177001229efe7ec5edef7a704ed6d0ade736df76ffaed8ef6eb95537bebad26ba570dfabb45c22fd9857585bab3f8a328beb4391ef9693
-
Filesize
47KB
MD503424c597882d3daa52bf027798b2e0b
SHA12d7fdd69b06226b6cdce05bc0820ad286b3e6b14
SHA25647ba146b7f2fb94a4793f6fe302b53cab7bd6bbe021b57b389a340a060ff8d7a
SHA51226a24e11ca9d7e26b44a74ef78108eb2a6aef071380703ab85b0b2ea92a719f4cd2ddbbb590a2837c18ac1cf33000872df242c4c263032d0df28ba955ae7ec90