Analysis
-
max time kernel
38s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:59
Behavioral task
behavioral1
Sample
b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe
Resource
win7-20240903-en
General
-
Target
b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe
-
Size
45KB
-
MD5
6d4e11b968c8b8bcb58c5d18fdbec947
-
SHA1
70806a98131536c7b910139115697fccb7ee35ab
-
SHA256
b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565
-
SHA512
43696ceb0285657281fd34ee78fdef13226b8ab6218592eb0488f68bbfd82e91734d5254a54ee8148ac7a0d1839f3072c11295d0ae839151b03fd25efc835f05
-
SSDEEP
768:nugPNTjgkH7F7WUHw9pmo2q7deeXKOZTN8/nPI6EzjbZgX3i7yAcsyi21cYBDZKx:nugPNTcI42Te3TNKA6E3b2XS7yZiscea
Malware Config
Extracted
asyncrat
0.5.7B
Default
192.168.43.113:6606
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
TOOL.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000024131-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe -
Executes dropped EXE 1 IoCs
pid Process 4688 TOOL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TOOL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4532 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe Token: SeDebugPrivilege 4688 TOOL.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5156 wrote to memory of 4116 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 94 PID 5156 wrote to memory of 4116 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 94 PID 5156 wrote to memory of 4116 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 94 PID 5156 wrote to memory of 4880 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 96 PID 5156 wrote to memory of 4880 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 96 PID 5156 wrote to memory of 4880 5156 b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe 96 PID 4116 wrote to memory of 4956 4116 cmd.exe 98 PID 4116 wrote to memory of 4956 4116 cmd.exe 98 PID 4116 wrote to memory of 4956 4116 cmd.exe 98 PID 4880 wrote to memory of 4532 4880 cmd.exe 99 PID 4880 wrote to memory of 4532 4880 cmd.exe 99 PID 4880 wrote to memory of 4532 4880 cmd.exe 99 PID 4880 wrote to memory of 4688 4880 cmd.exe 101 PID 4880 wrote to memory of 4688 4880 cmd.exe 101 PID 4880 wrote to memory of 4688 4880 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe"C:\Users\Admin\AppData\Local\Temp\b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "TOOL" /tr '"C:\Users\Admin\AppData\Roaming\TOOL.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "TOOL" /tr '"C:\Users\Admin\AppData\Roaming\TOOL.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7DAC.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4532
-
-
C:\Users\Admin\AppData\Roaming\TOOL.exe"C:\Users\Admin\AppData\Roaming\TOOL.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5353444fd9187e0cabdf174c193d5900b
SHA1373f7be2c937d5e50f0d13f3ed3e647b0b417879
SHA256bc926f7db69cc1814a554e7d47407f6fd3dce39f46e77449a8ce1dbc002ba9ff
SHA512309944ed649d927accd4393cb8d01b15e0a24516c97148b49ee181cf76ca6d0fdcb4ca5f20402f646a6b0611726369b33c7ae2f1db00cf19c8ea5258012c8a65
-
Filesize
45KB
MD56d4e11b968c8b8bcb58c5d18fdbec947
SHA170806a98131536c7b910139115697fccb7ee35ab
SHA256b876529297c2bdf41a81d9d11bf4755257e69db50ed756b80792896cab59a565
SHA51243696ceb0285657281fd34ee78fdef13226b8ab6218592eb0488f68bbfd82e91734d5254a54ee8148ac7a0d1839f3072c11295d0ae839151b03fd25efc835f05