Analysis
-
max time kernel
37s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/03/2025, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
Downloads.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Downloads.exe
Resource
win10v2004-20250314-en
General
-
Target
Downloads.exe
-
Size
30.0MB
-
MD5
ec06a1b0ea6f4debdc9778b59b63ec30
-
SHA1
9d40cf615c4d9f4c21b892fa5506a8f852cb3e1d
-
SHA256
1942639c541470539b15b8fea26b1a02b2182ced0f42f22af143c5170bb01cc6
-
SHA512
d62b9c59d933cda1879fd00d997deb60b952c1573d385638306ecdfdb8604aae56fcc0437566818b688fa694769948b4b8cadcb33e7bce98e69f15f753d973b6
-
SSDEEP
786432:zuTAzEyI4EETMmFxGF3khP1kGYJh5WcR0SGnCP+W:Rf3QUGUPCJnWqDP+W
Malware Config
Extracted
asyncrat
0.5.8
Default
197.48.105.157:5505
41.233.14.164:5505
197.48.230.161:5505
102.41.58.213:5505
q0nJ1vo1fsSD
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
quasar
1.4.1
Office04
102.41.58.213:5505
1e97a2db-0622-4c39-84ac-2f640c70aaf5
-
encryption_key
1F6CCF154B4C85A58D675CA9A482E9C7A041C879
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000012117-20.dat family_quasar behavioral1/memory/2860-151-0x0000000000A00000-0x0000000000D24000-memory.dmp family_quasar behavioral1/memory/2272-215-0x0000000000FD0000-0x00000000012F4000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000017079-28.dat family_asyncrat -
Executes dropped EXE 8 IoCs
pid Process 2860 v2.exe 2744 svchost.exe 2736 Built.exe 2740 Built.exe 1756 main.exe 2980 main.exe 2272 svchost.exe 2032 svchost.exe -
Loads dropped DLL 11 IoCs
pid Process 2400 Downloads.exe 2736 Built.exe 2400 Downloads.exe 2740 Built.exe 1756 main.exe 2980 main.exe 1212 Process not Found 1212 Process not Found 2472 cmd.exe 1212 Process not Found 1212 Process not Found -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir v2.exe File opened for modification C:\Windows\system32\SubDir\svchost.exe svchost.exe File opened for modification C:\Windows\system32\SubDir svchost.exe File created C:\Windows\system32\SubDir\svchost.exe v2.exe File opened for modification C:\Windows\system32\SubDir\svchost.exe v2.exe -
resource yara_rule behavioral1/files/0x0005000000019613-70.dat upx behavioral1/memory/2740-78-0x000007FEF1FE0000-0x000007FEF2644000-memory.dmp upx behavioral1/files/0x000500000001c8be-208.dat upx behavioral1/memory/2980-209-0x000007FEF5070000-0x000007FEF54DE000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000018683-71.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2700 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main Downloads.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe 2012 schtasks.exe 2556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2860 v2.exe Token: SeDebugPrivilege 2272 svchost.exe Token: SeDebugPrivilege 2744 svchost.exe Token: SeDebugPrivilege 2032 svchost.exe Token: SeDebugPrivilege 2032 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 Downloads.exe 2400 Downloads.exe 2272 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2860 2400 Downloads.exe 30 PID 2400 wrote to memory of 2860 2400 Downloads.exe 30 PID 2400 wrote to memory of 2860 2400 Downloads.exe 30 PID 2400 wrote to memory of 2744 2400 Downloads.exe 31 PID 2400 wrote to memory of 2744 2400 Downloads.exe 31 PID 2400 wrote to memory of 2744 2400 Downloads.exe 31 PID 2400 wrote to memory of 2744 2400 Downloads.exe 31 PID 2400 wrote to memory of 2736 2400 Downloads.exe 32 PID 2400 wrote to memory of 2736 2400 Downloads.exe 32 PID 2400 wrote to memory of 2736 2400 Downloads.exe 32 PID 2736 wrote to memory of 2740 2736 Built.exe 33 PID 2736 wrote to memory of 2740 2736 Built.exe 33 PID 2736 wrote to memory of 2740 2736 Built.exe 33 PID 2400 wrote to memory of 1756 2400 Downloads.exe 34 PID 2400 wrote to memory of 1756 2400 Downloads.exe 34 PID 2400 wrote to memory of 1756 2400 Downloads.exe 34 PID 1756 wrote to memory of 2980 1756 main.exe 35 PID 1756 wrote to memory of 2980 1756 main.exe 35 PID 1756 wrote to memory of 2980 1756 main.exe 35 PID 2860 wrote to memory of 2044 2860 v2.exe 36 PID 2860 wrote to memory of 2044 2860 v2.exe 36 PID 2860 wrote to memory of 2044 2860 v2.exe 36 PID 2860 wrote to memory of 2272 2860 v2.exe 38 PID 2860 wrote to memory of 2272 2860 v2.exe 38 PID 2860 wrote to memory of 2272 2860 v2.exe 38 PID 2272 wrote to memory of 2012 2272 svchost.exe 40 PID 2272 wrote to memory of 2012 2272 svchost.exe 40 PID 2272 wrote to memory of 2012 2272 svchost.exe 40 PID 2744 wrote to memory of 1952 2744 svchost.exe 43 PID 2744 wrote to memory of 1952 2744 svchost.exe 43 PID 2744 wrote to memory of 1952 2744 svchost.exe 43 PID 2744 wrote to memory of 1952 2744 svchost.exe 43 PID 2744 wrote to memory of 2472 2744 svchost.exe 45 PID 2744 wrote to memory of 2472 2744 svchost.exe 45 PID 2744 wrote to memory of 2472 2744 svchost.exe 45 PID 2744 wrote to memory of 2472 2744 svchost.exe 45 PID 1952 wrote to memory of 2556 1952 cmd.exe 47 PID 1952 wrote to memory of 2556 1952 cmd.exe 47 PID 1952 wrote to memory of 2556 1952 cmd.exe 47 PID 1952 wrote to memory of 2556 1952 cmd.exe 47 PID 2472 wrote to memory of 2700 2472 cmd.exe 48 PID 2472 wrote to memory of 2700 2472 cmd.exe 48 PID 2472 wrote to memory of 2700 2472 cmd.exe 48 PID 2472 wrote to memory of 2700 2472 cmd.exe 48 PID 2472 wrote to memory of 2032 2472 cmd.exe 49 PID 2472 wrote to memory of 2032 2472 cmd.exe 49 PID 2472 wrote to memory of 2032 2472 cmd.exe 49 PID 2472 wrote to memory of 2032 2472 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads.exe"C:\Users\Admin\AppData\Local\Temp\Downloads.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Windows\system32\SubDir\svchost.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2044
-
-
C:\Windows\system32\SubDir\svchost.exe"C:\Windows\system32\SubDir\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Windows\system32\SubDir\svchost.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD23D.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2700
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1.8MB
MD52a4aad7818d527bbea76e9e81077cc21
SHA14db3b39874c01bf3ba1ab8659957bbc28aab1ab2
SHA2564712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e
SHA512d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68
-
Filesize
21.3MB
MD5515af45a33fa20e3ca9c2dd8af26173a
SHA12808e1c0abbe4ceb5f6dbc28d3ae7324a4a916b4
SHA25626e339ac703a76ffe511176ecd7cf51507ed1510fdb28bf5b43cde652cf133cb
SHA512539a3eefef4d5514d6e04d5aa17aa143a985b6d80d7926eb8d2f0be279aeac05c47ab5693a6fcdbfd26ac8b57ae564b0f77c725300cdd94943804ab1469b7e90
-
Filesize
45KB
MD57a358df346afcd7c4202a27469d3bc3f
SHA1721cba1692ce475b90bb07509e122bba225676d6
SHA25649d72d7fc3ea35487f53feb6fb2b874ca43c441867b04e775c785e9c1637abad
SHA512336bc9ff4526424296045a60298c1713d2818d4fea434cfefa8771215bc1ba82d814158b699ffa497247f5185ba56f24724626086eef14bf83e58deb5286684f
-
Filesize
151B
MD5deeda9dfcaa6259ddde02485521ea517
SHA1ab0443b6ec4d6bd2e438ba2840794ca6629ff42d
SHA25669e639a39ecc4972d7b328ad0a05e5a88a3ae1f17cdcc43f684c6f499be575ec
SHA5128cd25ba249aab568264d883f7fec204ea6657b4e7c2b0db48e8ed84387e49bbeb99da977308db9020673d88ba6d689f9c2380842f0210b892ea082b552a70138
-
Filesize
3.1MB
MD544bf522a553e8fde9a377f75fde20442
SHA10f9cb72fe60c334f6aa0c6ae642f5d9867a4ff8e
SHA2561467681b3b224b5447b70e54088ded2dd27ca04ea5f27f14dfe6ce8369ad73b7
SHA512f72c59872ed8954d7ec4ab3e109c19bb7b2a750b1e7041a0aff9b38f0726d5bbaedc364f549a401c9f827d988521204f5c765ef286ff8d9d609ca4e1e5886879
-
Filesize
7.6MB
MD587955e082fa9276925d051fe0cf04374
SHA1d913ea62f3a3de054005827146396354b9cf109c
SHA25657c34ddd4dac10f0bd1298fb601622a83c29b682da1da865b6c3e75f7822778c
SHA5126afce8e9ddc6a1dd410b4e0ccc948a47279a38827dccaff4c6e5e77c7c6a1822ac4f350b5109c172d14a293d2ba513a179c1ba03eba8e2fadfc37878792e4409
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378