Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe
Resource
win7-20240903-en
General
-
Target
014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe
-
Size
798KB
-
MD5
0997e0d8d2828ad4da27e830fd6562d3
-
SHA1
ddcb9cb2462b6f7b2a688a7696e49164a1d40d44
-
SHA256
014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed
-
SHA512
4e356cef6d1d50d1d7ab249177703d06f6a34c0b37405e00c47d850aeac782a6fd0562daed815df05659ff16b81698cd6a11a034dc3b599f019d778cf67191ef
-
SSDEEP
12288:AyveQB/fTHIGaPkKEYzURNAwbAgWtJZLGxDUeYnqaGsSGo0/O6nG:AuDXTIGaPhEYzUzA0ASxA/qnsO6nG
Malware Config
Extracted
asyncrat
0.5.8
Default
opakk.hopto.org:34397
AkzHMC1tjq5U
-
delay
3
-
install
true
-
install_file
WUDFHost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000800000002426f-6.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation Test1.exe -
Executes dropped EXE 2 IoCs
pid Process 940 Test1.exe 3536 WUDFHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WUDFHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3524 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe 940 Test1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 940 Test1.exe Token: SeDebugPrivilege 3536 WUDFHost.exe Token: SeDebugPrivilege 3536 WUDFHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 6108 wrote to memory of 940 6108 014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe 94 PID 6108 wrote to memory of 940 6108 014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe 94 PID 6108 wrote to memory of 940 6108 014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe 94 PID 940 wrote to memory of 2752 940 Test1.exe 99 PID 940 wrote to memory of 2752 940 Test1.exe 99 PID 940 wrote to memory of 2752 940 Test1.exe 99 PID 940 wrote to memory of 720 940 Test1.exe 101 PID 940 wrote to memory of 720 940 Test1.exe 101 PID 940 wrote to memory of 720 940 Test1.exe 101 PID 2752 wrote to memory of 6084 2752 cmd.exe 103 PID 2752 wrote to memory of 6084 2752 cmd.exe 103 PID 2752 wrote to memory of 6084 2752 cmd.exe 103 PID 720 wrote to memory of 3524 720 cmd.exe 104 PID 720 wrote to memory of 3524 720 cmd.exe 104 PID 720 wrote to memory of 3524 720 cmd.exe 104 PID 720 wrote to memory of 3536 720 cmd.exe 105 PID 720 wrote to memory of 3536 720 cmd.exe 105 PID 720 wrote to memory of 3536 720 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe"C:\Users\Admin\AppData\Local\Temp\014dba300f314de1c296005e39b4263d50ff032b7eebea2353b2285c90f891ed.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Test1.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Test1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WUDFHost" /tr '"C:\Users\Admin\AppData\Roaming\WUDFHost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WUDFHost" /tr '"C:\Users\Admin\AppData\Roaming\WUDFHost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp972F.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3524
-
-
C:\Users\Admin\AppData\Roaming\WUDFHost.exe"C:\Users\Admin\AppData\Roaming\WUDFHost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD58426efde5119f38f7436dc6170635bae
SHA11f68a03059e2b27b1b4529f906fe7336a743b2ac
SHA2568d30a30ff9b086ccb05f68a4297f73cdc252d2e847dfd3eee35e770c25d99689
SHA5128c1a0338f9b53657866eb5b8f2b1e9a736877ee599a38ad6c956eec2062a4b62501b03893b93d9995c062f8c90fb7901ebdf4b3a4ef2a3944629cd47f9df7e57
-
Filesize
152B
MD5dc51b27ec444833522fd2d633d03149c
SHA1d2d290e287959ba4cf4a678fd832046ff28f171b
SHA25604f8b2923640c4263817578f39dc31b2b6405a68cfa8f99ecaf90f21de2155ba
SHA512615ef9c258ce0b68541d960e65cc88488d7aa43da1bc45fdfa4f71df26780b16fe934a20e86517bb0fa9bfbb9cd1545595abb8c9d98b326e45963243505a86c1