Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 21:32
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dropper.exe
Resource
win10v2004-20250217-en
General
-
Target
Dropper.exe
-
Size
18.0MB
-
MD5
392b044ac8ee5751045a163b2d1a358f
-
SHA1
56429e69619c0e69128732051db6e0e9bc40c18c
-
SHA256
1001e70668789e08f7979484610e5246fa3c760142bc3ca8a55ce3da2301907a
-
SHA512
2d0fd9963373132fde1d442d742efc95e8510f61325518aead420eeffb70e2a7566d95d3015ad930c4beddd2aa3d5b937b5711d0b0d09ee795eb6136aa26409b
-
SSDEEP
393216:m9YidhKRmmb1TfHqO1UyXMCHWUjlVg74wdugWIPPVBFVVJo8W:m9Yidh0MyXMb8PDwduGPPVNV+8W
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.1.222:6606
192.168.1.222:7707
192.168.1.222:8808
mA2752pAY1JK
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
192.168.1.222:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000016dd1-17.dat family_xworm behavioral1/memory/2256-22-0x0000000001220000-0x0000000001238000-memory.dmp family_xworm behavioral1/memory/1812-135-0x0000000000B30000-0x0000000000B48000-memory.dmp family_xworm -
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001225c-4.dat family_asyncrat -
Executes dropped EXE 7 IoCs
pid Process 1716 AsyncClient2.exe 2516 pile.exe 2256 XClient.exe 3016 trap1.exe 1728 0.exe 1812 1.exe 2176 trap1.exe -
Loads dropped DLL 7 IoCs
pid Process 1928 Dropper.exe 1928 Dropper.exe 1928 Dropper.exe 1928 Dropper.exe 2736 Process not Found 3016 trap1.exe 2176 trap1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016dd7-26.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dropper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2256 XClient.exe Token: SeDebugPrivilege 1812 1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1928 Dropper.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1716 1928 Dropper.exe 31 PID 1928 wrote to memory of 1716 1928 Dropper.exe 31 PID 1928 wrote to memory of 1716 1928 Dropper.exe 31 PID 1928 wrote to memory of 1716 1928 Dropper.exe 31 PID 1928 wrote to memory of 2516 1928 Dropper.exe 32 PID 1928 wrote to memory of 2516 1928 Dropper.exe 32 PID 1928 wrote to memory of 2516 1928 Dropper.exe 32 PID 1928 wrote to memory of 2516 1928 Dropper.exe 32 PID 1928 wrote to memory of 2256 1928 Dropper.exe 33 PID 1928 wrote to memory of 2256 1928 Dropper.exe 33 PID 1928 wrote to memory of 2256 1928 Dropper.exe 33 PID 1928 wrote to memory of 2256 1928 Dropper.exe 33 PID 1928 wrote to memory of 3016 1928 Dropper.exe 34 PID 1928 wrote to memory of 3016 1928 Dropper.exe 34 PID 1928 wrote to memory of 3016 1928 Dropper.exe 34 PID 1928 wrote to memory of 3016 1928 Dropper.exe 34 PID 2516 wrote to memory of 1728 2516 pile.exe 36 PID 2516 wrote to memory of 1728 2516 pile.exe 36 PID 2516 wrote to memory of 1728 2516 pile.exe 36 PID 2516 wrote to memory of 1728 2516 pile.exe 36 PID 2516 wrote to memory of 1812 2516 pile.exe 37 PID 2516 wrote to memory of 1812 2516 pile.exe 37 PID 2516 wrote to memory of 1812 2516 pile.exe 37 PID 3016 wrote to memory of 2176 3016 trap1.exe 38 PID 3016 wrote to memory of 2176 3016 trap1.exe 38 PID 3016 wrote to memory of 2176 3016 trap1.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dropper.exe"C:\Users\Admin\AppData\Local\Temp\Dropper.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient2.exe" 02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\pile.exe"C:\Users\Admin\AppData\Local\Temp\pile.exe" 02⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\0.exe"C:\Users\Admin\AppData\Roaming\0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe" 02⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\trap1.exe"C:\Users\Admin\AppData\Local\Temp\trap1.exe" 02⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\trap1.exe"C:\Users\Admin\AppData\Local\Temp\trap1.exe" 03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD5501080884bed38cb8801a307c9d7b7b4
SHA1881b250cc8f4fa4f75111ac557a4fde8e1e217af
SHA256bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749
SHA51263d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9
-
Filesize
47KB
MD5552ffc8c5f01477794e54ca98130f2d3
SHA13232ea63d8a89ecf9d188b84c2090ed0aa5740ed
SHA256a161c7118b90a154291649f3c135d3d4e5f100e8017b01ea912a46e90ad28b87
SHA51255da0b761f87f1d0328bc606c9ae49277d7e455d40e394b839a7e4d1a5ade6b3069db5209b29caa4dce02c5b2f5f33840ac788d8bee075a6fff0dbb6530fa2d4
-
Filesize
72KB
MD5b98d6315ae637e71ff52fc89ee293606
SHA1005064d052b5404c63323684482beb3be33799c8
SHA25623c49a66fad823d47a1cb2e742ac4c12f51d6597f35f31635ab26337e59b410b
SHA5122c7a22ac894ee34d00f8f334bb26fb0a9da32162e5d0d000a9bdeb6d2b63dee9768aaaf6fb68d2d229b29576b71af7cda5758f503252187a3d6030da9088ec74
-
Filesize
431KB
MD56fecf711df62b628669d1027d14a4bf5
SHA16062a129555a89ee968c84aabb45ae7a59b0b44b
SHA2560a83e74cc52104c71010d4d66703ff34d5a9245a9d46f7926fc667ad4201550c
SHA512e2fa8590ec04bbf1db51dc692684e00d6e6fe5ae77da398900348dda5859cffc3455138ec0ab9434e624b394b68a6d8750a41514f34108b40121231eb19f88b5
-
Filesize
17.4MB
MD5f99bcfad4d7e5b4034a208231ab52a68
SHA1ca2cae0d8b7d656e355c3b9dcda0aed3b3de9534
SHA2562971c12fa4af39c67f2f59e391f118e350f9824d198c54b0634de9f4cdc963b9
SHA51278d327c84f6a69a09257057250a1db7ee21725d0fee4a75f5d07389f986fb5ceb6015a74a9d0b5d3ecd7ba77c0d473c4bd17a2dd62a5895221c019af1a173587