Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe
Resource
win7-20241010-en
General
-
Target
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe
-
Size
20.8MB
-
MD5
a850018996dace168754fcf5da674b81
-
SHA1
8c893659bca023f30cd9fd4348c4b383caee8e43
-
SHA256
068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc
-
SHA512
75a305c67d0e8e6ab34f8f593fcc0f9a89d5c40c8b231657751b63e855478bb3787851cd0e319743ad1aa21e4ca15d398f2a91d01448de146e60c5bdf4b286f0
-
SSDEEP
393216:w3Tc4BVJHWsi1B8k/z3sXCeIxO3Y3HmgEwP6cv/3X38WdGe:wQ4BbHql/zcXz3Y3Qwv3X38Wj
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
EulenV4
chxtzuezuve
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/KnhCGRrn
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016c10-8.dat family_asyncrat -
Executes dropped EXE 5 IoCs
pid Process 2780 runtime.exe 2892 svchost.exe 2816 loader.exe 2948 loader.exe 996 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 2816 loader.exe 2948 loader.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 4 pastebin.com 5 pastebin.com 6 pastebin.com 7 pastebin.com 11 pastebin.com 8 pastebin.com 9 pastebin.com 10 pastebin.com 12 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2372 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2456 powershell.exe 2892 svchost.exe 2892 svchost.exe 2892 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe 996 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2892 svchost.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2892 svchost.exe Token: SeDebugPrivilege 996 svchost.exe Token: SeDebugPrivilege 996 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 996 svchost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2456 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 30 PID 3036 wrote to memory of 2456 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 30 PID 3036 wrote to memory of 2456 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 30 PID 3036 wrote to memory of 2456 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 30 PID 3036 wrote to memory of 2780 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 32 PID 3036 wrote to memory of 2780 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 32 PID 3036 wrote to memory of 2780 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 32 PID 3036 wrote to memory of 2780 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 32 PID 3036 wrote to memory of 2892 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 33 PID 3036 wrote to memory of 2892 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 33 PID 3036 wrote to memory of 2892 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 33 PID 3036 wrote to memory of 2892 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 33 PID 3036 wrote to memory of 2816 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 34 PID 3036 wrote to memory of 2816 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 34 PID 3036 wrote to memory of 2816 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 34 PID 3036 wrote to memory of 2816 3036 068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe 34 PID 2780 wrote to memory of 2488 2780 runtime.exe 35 PID 2780 wrote to memory of 2488 2780 runtime.exe 35 PID 2780 wrote to memory of 2488 2780 runtime.exe 35 PID 2816 wrote to memory of 2948 2816 loader.exe 36 PID 2816 wrote to memory of 2948 2816 loader.exe 36 PID 2816 wrote to memory of 2948 2816 loader.exe 36 PID 2892 wrote to memory of 3008 2892 svchost.exe 37 PID 2892 wrote to memory of 3008 2892 svchost.exe 37 PID 2892 wrote to memory of 3008 2892 svchost.exe 37 PID 2892 wrote to memory of 1964 2892 svchost.exe 39 PID 2892 wrote to memory of 1964 2892 svchost.exe 39 PID 2892 wrote to memory of 1964 2892 svchost.exe 39 PID 3008 wrote to memory of 2384 3008 cmd.exe 41 PID 3008 wrote to memory of 2384 3008 cmd.exe 41 PID 3008 wrote to memory of 2384 3008 cmd.exe 41 PID 1964 wrote to memory of 2372 1964 cmd.exe 42 PID 1964 wrote to memory of 2372 1964 cmd.exe 42 PID 1964 wrote to memory of 2372 1964 cmd.exe 42 PID 1964 wrote to memory of 996 1964 cmd.exe 43 PID 1964 wrote to memory of 996 1964 cmd.exe 43 PID 1964 wrote to memory of 996 1964 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe"C:\Users\Admin\AppData\Local\Temp\068f0b81ba4d831dec722c6c86d4d328ca80abe5ef30bda755499064de812ccc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAaABuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGwAdwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAZwB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAYQBwACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\runtime.exe"C:\Users\Admin\AppData\Local\Temp\runtime.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2780 -s 5363⤵PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9E90.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\onefile_2816_133876096085440000\loader.exeC:\Users\Admin\AppData\Local\Temp\loader.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
151B
MD55769e8e7669408ee46ab333c4f0c04f1
SHA1d355eb68af6caedfd46deee7f6813171baca63b5
SHA25624d06934586825efee58ac51b4d229359b321cb1476377224108f299b5d67269
SHA512222ba1a3b385c69ee4379a2d4e611e62abcf0e16b678f1f030c21555ef75bd568b98cf498e59a40533d80f8e3fe77945ac926a31d85a4e8ca03e48e3170a7e0a
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
20.7MB
MD54ed0d5143664ce4d6a25072f1c465616
SHA1e560ecd9fe3a6754d72493d9e0e796e3837be5df
SHA256ac9bb0231e3e3e4305a2cf44708dbf7e0e6cfa286faac9bc687c364a4070e398
SHA512d763f44d7a5bff11a3a75c7b4182362ad63d33618402480aa3c993b1ed8f21dfda0e70cf25e71e33ffac5f9ca541fa0a3c96c53abb510fc36a5917373528f466
-
Filesize
12.0MB
MD5d40e357c84cda7eb31419a69ae038d97
SHA1853d03a0cfe3aa0f21d16b2da378e4554c71a088
SHA25645215606ecea7c6d2624d05ee6b0703beb9d0abdf42566c77ccb89576338b8c6
SHA51282a67c7be3fef7d4deb4d1c1e85d392fdfb16e830f9574868c8bcc42aa3eb8a3435b0d3d0786a1015af8f8b41f66074a1825a24eb559e42b164aca71ee3dca2f
-
Filesize
58KB
MD51ab99ff9dfb2017db1a59403f5ca1c2b
SHA14e43875075d8dd21755aa8dd91365d561be43594
SHA256bd9f8e352f172f3a5ad106388d1fd67ed09f419f1d100bd89e7980e25d273526
SHA51244bb3c86caa4b2c0c63251d602f03aa5a38d099ece58462dc78d38740981733b731711250b34db2a93c8b2a1fab7e707e29ee010b24129d762daed226d72ca4a
-
Filesize
74KB
MD585f89a5f5806117cc82aec6e1f89cd13
SHA1735d2331d6bc90498f3f1405af0dffa37b136e5d
SHA256adbce5e454bbc8b27c4ac87f70dee8d622395b541736d6f0af027dd94e454cb7
SHA512038c96c575f0a1204a4159cd7ac9262f7e1447be9bba28278ddcdd6294280f40399cfb06a89e40460114306c9b5a33d466ac2de7af58575b80cad0921f4a979d