Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 16:05
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240903-en
General
-
Target
AsyncClient.exe
-
Size
48KB
-
MD5
c73e9ac2a8016900540f7e8c076a0c6c
-
SHA1
a06194d2d31c4092bafe50b7fe034c2df6eeae64
-
SHA256
6d52f72d16a4e5057ba82b43278e47b4c44d3d1ec8566681e72bfe21d7e86a63
-
SHA512
a6c92ba547761d28374b56b433fb75bec1e7c12c060c77bcb32b570b3c6a390a0cd12ee7ed66a3cc5f4ea70f20fa85720b082604988b9ddcd7d88f5ee61b7e33
-
SSDEEP
768:iuUjVTwkbBHWU72ZcFmo2qjuG2aJbnOPI2MgCZDXoN0be7UX+xoLlM6ZmR3i58TP:iuUjVTwA4M2op2MgCXoKbGUXooLl/Z8v
Malware Config
Extracted
asyncrat
0.5.8
Default
EsPbolIGiMu1
-
delay
3
-
install
true
-
install_file
ratatoulie.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/hcwJVFkr
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000300000001e925-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation AsyncClient.exe -
Executes dropped EXE 1 IoCs
pid Process 556 ratatoulie.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 pastebin.com 25 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratatoulie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5092 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe 4408 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4408 AsyncClient.exe Token: SeDebugPrivilege 556 ratatoulie.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2940 4408 AsyncClient.exe 91 PID 4408 wrote to memory of 2940 4408 AsyncClient.exe 91 PID 4408 wrote to memory of 2940 4408 AsyncClient.exe 91 PID 4408 wrote to memory of 4872 4408 AsyncClient.exe 93 PID 4408 wrote to memory of 4872 4408 AsyncClient.exe 93 PID 4408 wrote to memory of 4872 4408 AsyncClient.exe 93 PID 2940 wrote to memory of 624 2940 cmd.exe 95 PID 2940 wrote to memory of 624 2940 cmd.exe 95 PID 2940 wrote to memory of 624 2940 cmd.exe 95 PID 4872 wrote to memory of 5092 4872 cmd.exe 96 PID 4872 wrote to memory of 5092 4872 cmd.exe 96 PID 4872 wrote to memory of 5092 4872 cmd.exe 96 PID 4872 wrote to memory of 556 4872 cmd.exe 98 PID 4872 wrote to memory of 556 4872 cmd.exe 98 PID 4872 wrote to memory of 556 4872 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ratatoulie" /tr '"C:\Users\Admin\AppData\Roaming\ratatoulie.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ratatoulie" /tr '"C:\Users\Admin\AppData\Roaming\ratatoulie.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpCC29.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5092
-
-
C:\Users\Admin\AppData\Roaming\ratatoulie.exe"C:\Users\Admin\AppData\Roaming\ratatoulie.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD5c9567860e0b3d6cb07a197464ff4b4a0
SHA1e494a214b6993a05b4191fcabc37fa455285a2eb
SHA256a63ab7c72f436fefb084b25a220c5aca79d077912a47ccc4106bcaa715d2de23
SHA512092bff2ab71e0d1432d4261008182d680e38232232fe2d7d3fd8f069961410f5baa0e56c126cd37b91986750bc45cacd9ec08b9a3cd2ab30d6621c593f506fc3
-
Filesize
48KB
MD5c73e9ac2a8016900540f7e8c076a0c6c
SHA1a06194d2d31c4092bafe50b7fe034c2df6eeae64
SHA2566d52f72d16a4e5057ba82b43278e47b4c44d3d1ec8566681e72bfe21d7e86a63
SHA512a6c92ba547761d28374b56b433fb75bec1e7c12c060c77bcb32b570b3c6a390a0cd12ee7ed66a3cc5f4ea70f20fa85720b082604988b9ddcd7d88f5ee61b7e33