Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe
Resource
win10v2004-20250314-en
General
-
Target
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe
-
Size
262KB
-
MD5
bb3d025def36b30d2fb3f442995fba03
-
SHA1
6c19a62c2823afce16fd56c9f7ca3fc34c04d49b
-
SHA256
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100
-
SHA512
22322032c27e91970b4907cb2d14d889dffdc95f9914788a4f312518bb9b3172eb70bbbd8a32879b28d6fbe24ca721c8424c0c0dac3e247f2424ef318ab789e1
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/eX:WFzDqa86hV6uRRqX1evPlwAw
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2576-29-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2576-34-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2576-32-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2576-36-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2576-35-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1200 HiPatchService.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1200 set thread context of 2576 1200 HiPatchService.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HiPatchService.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe 2576 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe Token: SeShutdownPrivilege 2636 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe 2636 explorer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 1200 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 32 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 2652 wrote to memory of 2584 2652 85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe 33 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 PID 1200 wrote to memory of 2576 1200 HiPatchService.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe"C:\Users\Admin\AppData\Local\Temp\85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2636
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
263KB
MD5a86a0a2cce4b8bf4ad7bff9b7da82570
SHA18485b0c58d166b21dec296803d55292ee16bb835
SHA256753a919a743e379a333d76523067ce603dc0cfa1e8412dd725b28897c83801ea
SHA51221fd13280539d8e1829859d3b7be3562f4b3f199d7bec51319ba4391312e95946e862093f60fec8e8dc48f1eccd0004fd2413217c03bf417f3f51805e6d8755e