Overview
overview
10Static
static
10a200ccdf59...cb.exe
windows7-x64
1a200ccdf59...cb.exe
windows10-2004-x64
1a24432a439...39.exe
windows7-x64
1a24432a439...39.exe
windows10-2004-x64
1a261b01eac...35.exe
windows7-x64
10a261b01eac...35.exe
windows10-2004-x64
10a277e4ef19...9e.exe
windows7-x64
10a277e4ef19...9e.exe
windows10-2004-x64
10a2c94b5453...64.exe
windows7-x64
7a2c94b5453...64.exe
windows10-2004-x64
7a2e433f395...34.exe
windows7-x64
10a2e433f395...34.exe
windows10-2004-x64
10a2fad1a052...95.exe
windows7-x64
10a2fad1a052...95.exe
windows10-2004-x64
10a30ce01ad9...4d.exe
windows7-x64
7a30ce01ad9...4d.exe
windows10-2004-x64
7a31ba0b291...4c.exe
windows7-x64
10a31ba0b291...4c.exe
windows10-2004-x64
10a340d849cc...86.exe
windows7-x64
10a340d849cc...86.exe
windows10-2004-x64
10a34ed8c989...d1.exe
windows7-x64
10a34ed8c989...d1.exe
windows10-2004-x64
10a39a36bdb6...eb.exe
windows7-x64
10a39a36bdb6...eb.exe
windows10-2004-x64
10a3a42aeb37...7f.exe
windows7-x64
10a3a42aeb37...7f.exe
windows10-2004-x64
10a3a62b600d...4c.exe
windows7-x64
10a3a62b600d...4c.exe
windows10-2004-x64
10a3bf76de64...be.exe
windows7-x64
10a3bf76de64...be.exe
windows10-2004-x64
10a3d1683844...56.exe
windows7-x64
10a3d1683844...56.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a200ccdf59ff84f5065f7d978cedcb7cc882fa0480f3e5738183e732111353cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a200ccdf59ff84f5065f7d978cedcb7cc882fa0480f3e5738183e732111353cb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a24432a43960cdb6f6f7f18467006139.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
a24432a43960cdb6f6f7f18467006139.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a261b01eacf8494cec58f0a20d573d35.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
a261b01eacf8494cec58f0a20d573d35.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a277e4ef1921464c0cfaec6401b3189e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a277e4ef1921464c0cfaec6401b3189e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a2c94b545313da9045688c2829942864.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
a2c94b545313da9045688c2829942864.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a2e433f395cc3b1c1ccf0cc50a676434.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a2e433f395cc3b1c1ccf0cc50a676434.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a2fad1a0523c112ac6e3c50f6d52a6e6f095ed7b92c1471cd01014a46686d495.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
a2fad1a0523c112ac6e3c50f6d52a6e6f095ed7b92c1471cd01014a46686d495.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a30ce01ad9f6493d46ac928557bcdd4d.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
a30ce01ad9f6493d46ac928557bcdd4d.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
a31ba0b291554684b4a097371669bc4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a31ba0b291554684b4a097371669bc4c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a340d849cc988d5d06f7e30143d62c86.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
a340d849cc988d5d06f7e30143d62c86.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a34ed8c9896cc074e235b2c4116871d1.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
a34ed8c9896cc074e235b2c4116871d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a39a36bdb616e78fd52282d03b4a53eb.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
a39a36bdb616e78fd52282d03b4a53eb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a3a42aeb37eef56ad6d6e839ecf90e7f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a3a42aeb37eef56ad6d6e839ecf90e7f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a3a62b600d751eaaf32c95c6c03ea74c.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
a3a62b600d751eaaf32c95c6c03ea74c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a3bf76de6495ca8e41bd7204f50b00be.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
a3bf76de6495ca8e41bd7204f50b00be.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a3d1683844f5211b303b529b3dfa6c87d9ecc37f8806097d5792dd394d52eb56.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
a3d1683844f5211b303b529b3dfa6c87d9ecc37f8806097d5792dd394d52eb56.exe
Resource
win10v2004-20250314-en
General
-
Target
a340d849cc988d5d06f7e30143d62c86.exe
-
Size
63KB
-
MD5
a340d849cc988d5d06f7e30143d62c86
-
SHA1
3bf172f21f8291c408e34ec8cedb2aa3db55861a
-
SHA256
0ec25e2bfb539e7fd9445ea617597e6e6d64f8c49c54f105091fc0763cc154b4
-
SHA512
96abc6657b576bddd6bc46d7344dc2d033cd120e8b7a569c7949f98251c7b688274f747a94f978d3d06130d9ae9fc3c72e88b265fb85be2093029d06580a2baa
-
SSDEEP
1536:lUFBzZBVrhJPkYUbjh9oM/JlXup4pqKmY7:l0VBV4YUbjE8JlMjz
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3230
-
delay
1
-
install
true
-
install_file
Serial_checker.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral19/files/0x000c000000012262-16.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2580 Serial_checker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2800 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2840 a340d849cc988d5d06f7e30143d62c86.exe 2840 a340d849cc988d5d06f7e30143d62c86.exe 2840 a340d849cc988d5d06f7e30143d62c86.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2840 a340d849cc988d5d06f7e30143d62c86.exe Token: SeDebugPrivilege 2580 Serial_checker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2660 2840 a340d849cc988d5d06f7e30143d62c86.exe 31 PID 2840 wrote to memory of 2660 2840 a340d849cc988d5d06f7e30143d62c86.exe 31 PID 2840 wrote to memory of 2660 2840 a340d849cc988d5d06f7e30143d62c86.exe 31 PID 2660 wrote to memory of 2692 2660 cmd.exe 33 PID 2660 wrote to memory of 2692 2660 cmd.exe 33 PID 2660 wrote to memory of 2692 2660 cmd.exe 33 PID 2840 wrote to memory of 2652 2840 a340d849cc988d5d06f7e30143d62c86.exe 34 PID 2840 wrote to memory of 2652 2840 a340d849cc988d5d06f7e30143d62c86.exe 34 PID 2840 wrote to memory of 2652 2840 a340d849cc988d5d06f7e30143d62c86.exe 34 PID 2652 wrote to memory of 2800 2652 cmd.exe 36 PID 2652 wrote to memory of 2800 2652 cmd.exe 36 PID 2652 wrote to memory of 2800 2652 cmd.exe 36 PID 2652 wrote to memory of 2580 2652 cmd.exe 37 PID 2652 wrote to memory of 2580 2652 cmd.exe 37 PID 2652 wrote to memory of 2580 2652 cmd.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a340d849cc988d5d06f7e30143d62c86.exe"C:\Users\Admin\AppData\Local\Temp\a340d849cc988d5d06f7e30143d62c86.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Serial_checker" /tr '"C:\Users\Admin\AppData\Roaming\Serial_checker.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Serial_checker" /tr '"C:\Users\Admin\AppData\Roaming\Serial_checker.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp788A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2800
-
-
C:\Users\Admin\AppData\Roaming\Serial_checker.exe"C:\Users\Admin\AppData\Roaming\Serial_checker.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD50dadf057bcf12ff5ce8eba8401444291
SHA1cdf667d57af509d48199bde8c5874fdf6303f795
SHA256bf7e7312640ec275360c1a2da0fc8dbb24bb5cdbe5ee1b8df4ae47f690a76dfb
SHA512b992a2d31156de0d4afe725743e93decdf0fc209c49a7e6190447c0b2ce33f37aa6372230034a1a472286f780ed55a3894d0873fca6906379ee59a5b6e356bfc
-
Filesize
63KB
MD5a340d849cc988d5d06f7e30143d62c86
SHA13bf172f21f8291c408e34ec8cedb2aa3db55861a
SHA2560ec25e2bfb539e7fd9445ea617597e6e6d64f8c49c54f105091fc0763cc154b4
SHA51296abc6657b576bddd6bc46d7344dc2d033cd120e8b7a569c7949f98251c7b688274f747a94f978d3d06130d9ae9fc3c72e88b265fb85be2093029d06580a2baa