Overview
overview
10Static
static
10c39e5e5773...fb.exe
windows7-x64
7c39e5e5773...fb.exe
windows10-2004-x64
7c3a61d282c...2f.exe
windows7-x64
7c3a61d282c...2f.exe
windows10-2004-x64
7c3aaa8d067...d1.exe
windows7-x64
10c3aaa8d067...d1.exe
windows10-2004-x64
10c40612db16...6d.exe
windows7-x64
10c40612db16...6d.exe
windows10-2004-x64
10c45000d072...99.exe
windows7-x64
10c45000d072...99.exe
windows10-2004-x64
10c4639b8ab9...97.exe
windows7-x64
10c4639b8ab9...97.exe
windows10-2004-x64
10c47cd91636...6d.exe
windows7-x64
1c47cd91636...6d.exe
windows10-2004-x64
1c486ed6acb...df.exe
windows7-x64
7c486ed6acb...df.exe
windows10-2004-x64
7c4b4c8152f...dc.exe
windows7-x64
10c4b4c8152f...dc.exe
windows10-2004-x64
10c4c197e502...e0.exe
windows7-x64
10c4c197e502...e0.exe
windows10-2004-x64
10c4ca622404...18.exe
windows7-x64
10c4ca622404...18.exe
windows10-2004-x64
10c50b533887...50.exe
windows7-x64
10c50b533887...50.exe
windows10-2004-x64
10c50b94cf52...6f.exe
windows7-x64
10c50b94cf52...6f.exe
windows10-2004-x64
10c520bfebf2...a2.exe
windows7-x64
8c520bfebf2...a2.exe
windows10-2004-x64
10c53059381a...48.exe
windows7-x64
10c53059381a...48.exe
windows10-2004-x64
10c59549cfc2...b8.exe
windows7-x64
1c59549cfc2...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c39e5e577360a09a924844399e1953fb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
c3aaa8d0678c59cfe55a289d29c5b3d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
c40612db16415a3ee8c44a6f5157ef0e20ae02daa0d2c9c0cb99eac72887466d.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
c45000d07293154a655ba52ffb7bab99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c4639b8ab98b523a89ed2bda24ad0398b38514d4a5737e6450912caaca523297.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
c47cd916369fb96f0624e8c8a549946d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
c486ed6acb598d864bd441b40bbb31df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
c4b4c8152f8279bd2440201d33beb75aa3078ebc76c0622bb4778375afb08adc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
c4c197e50214b25100e10fb00b2ac6e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
c4ca622404b5b4763e20a205a41db518.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
c50b533887d2992f66c414bd95339750.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c50b94cf52f9ee1ec307059e727995fc0e98c8003570e368508d911debf3cd6f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c520bfebf2b7ca231d0b6bb731bc67c608dad8f84583daab3f8d0783fa3ae7a2.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c53059381a17db7f48cf6871b7869c48.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
c59549cfc2b2687a8a799ef4b5c772e60d089fff5ccd837b46f07b019eb359b8.exe
Resource
win10v2004-20250314-en
General
-
Target
c4c197e50214b25100e10fb00b2ac6e0.exe
-
Size
273KB
-
MD5
c4c197e50214b25100e10fb00b2ac6e0
-
SHA1
1dfac5794ccab5ec1e3c4897b8069c85e44bde19
-
SHA256
91b9c5ee1050b5ba75f7ad5e1daace80e64220fc71cb4cda0a2265b0559afa5f
-
SHA512
11d6fca3edc71affd5ae97743ae2e3a4ed8172f73e1f1a4d799baeb335a1f2a0219f652b2bc5d4d6a45144b936e047842579a50926813eacd9b9be1bfb8a2878
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdTk:WFzDqa86hV6uRRqX1evPlwAEdA
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral19/memory/2616-36-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral19/memory/2616-31-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral19/memory/2616-33-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral19/memory/2616-38-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral19/memory/2616-37-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 2852 HiPatchService.exe -
Loads dropped DLL 1 IoCs
pid Process 3056 c4c197e50214b25100e10fb00b2ac6e0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" c4c197e50214b25100e10fb00b2ac6e0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 2616 2852 HiPatchService.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4c197e50214b25100e10fb00b2ac6e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiPatchService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2852 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 30 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 3056 wrote to memory of 2620 3056 c4c197e50214b25100e10fb00b2ac6e0.exe 31 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33 PID 2852 wrote to memory of 2616 2852 HiPatchService.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4c197e50214b25100e10fb00b2ac6e0.exe"C:\Users\Admin\AppData\Local\Temp\c4c197e50214b25100e10fb00b2ac6e0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
273KB
MD581f5044f96b417f122626b5393793dcd
SHA1875b6a1f0d934d69839a51a0dbeb62553e432537
SHA256df1f06e9b9a65719a39c738180bf99067ba62505f73309b49e98f5efb37341ad
SHA512ad814b1ae5427835ae9c4805641f310c9aaf475df8b8c6cf90eead724fdcb9211ccfb2a8a7cd8722701b00133da543ee2e5c303971d103e88948f7c43d2fd0cd