Analysis
-
max time kernel
106s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 19:23
Behavioral task
behavioral1
Sample
93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe
Resource
win7-20241010-en
General
-
Target
93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe
-
Size
47KB
-
MD5
9cd4cecc2222edd87b47d91699994f1b
-
SHA1
4adaad47a38b75be90ce2c09e03570573aa25668
-
SHA256
93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64
-
SHA512
9a662a47455183be5bd09e81551bcf8e1d632da4fcbc24be0af52b08f1a9eda7ebf9f2c9449ec0e0a238bde95cfc00e828bdfe82c8d23e493651c77bcecf61b9
-
SSDEEP
768:kV0aWbILWCaS+Dimiiv68YbugD4xE0RtvEgK/JjZVc6KN:k6aMWzzbRiECnkJjZVclN
Malware Config
Extracted
asyncrat
1.0.7
7777
up.nemesissoftlab.com:7777
7
-
delay
1
-
install
true
-
install_file
usb.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002404a-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe -
Executes dropped EXE 1 IoCs
pid Process 5476 usb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2628 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe Token: SeDebugPrivilege 5476 usb.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5456 wrote to memory of 4528 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 92 PID 5456 wrote to memory of 4528 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 92 PID 5456 wrote to memory of 5188 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 94 PID 5456 wrote to memory of 5188 5456 93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe 94 PID 5188 wrote to memory of 2628 5188 cmd.exe 96 PID 5188 wrote to memory of 2628 5188 cmd.exe 96 PID 4528 wrote to memory of 4736 4528 cmd.exe 97 PID 4528 wrote to memory of 4736 4528 cmd.exe 97 PID 5188 wrote to memory of 5476 5188 cmd.exe 102 PID 5188 wrote to memory of 5476 5188 cmd.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe"C:\Users\Admin\AppData\Local\Temp\93dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "usb" /tr '"C:\Users\Admin\AppData\Roaming\usb.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "usb" /tr '"C:\Users\Admin\AppData\Roaming\usb.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5C2A.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2628
-
-
C:\Users\Admin\AppData\Roaming\usb.exe"C:\Users\Admin\AppData\Roaming\usb.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD53d59c400ea0c66f90ee51f8baaab18b4
SHA18a54d3bddd39ef1aeb007bb4bd6ecb37b32beaed
SHA256fe066aa0098bd32b3f8b0de4b4e57d0a941a066652af575fceb7124df66d0814
SHA512aafbfa10427826e07eefd552bb0f2dccf54eeff67bed15e6d74cebff240d1733511998b1ff37ad0e17bc6b25e290fbd40c2c9ead6b3f0e165604df50016809f9
-
Filesize
47KB
MD59cd4cecc2222edd87b47d91699994f1b
SHA14adaad47a38b75be90ce2c09e03570573aa25668
SHA25693dc353da2ebdd6a3cec8e1d2401f88284001e2083628c40c4cf06a7c8f92a64
SHA5129a662a47455183be5bd09e81551bcf8e1d632da4fcbc24be0af52b08f1a9eda7ebf9f2c9449ec0e0a238bde95cfc00e828bdfe82c8d23e493651c77bcecf61b9