Analysis
-
max time kernel
58s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2025, 19:46
Behavioral task
behavioral1
Sample
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe
Resource
win10v2004-20250410-en
General
-
Target
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe
-
Size
62KB
-
MD5
852c0a85fbd6d9d052676efe8f12d69e
-
SHA1
a828267cbe343c93f9453b28206ea259b9e02917
-
SHA256
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae
-
SHA512
26d2d61c5bb9258116ed94012186ea2c9666b301e1a76892401c11b2f649a30b1cb9dc5679d98293ff797eaaa49ecede09fb1ded8ce41e433660113dde3dc672
-
SSDEEP
1536:C5gfnNsYMnl70qDzZeeCglUGbbXw6qO06HGTkpqKmY7k:C5gfnNsYMnl7XzMep+GbbXB9Svz3
Malware Config
Extracted
asyncrat
0.0.1
Default
127.0.0.1:8848
127.0.0.1:31880
111.180.190.199:8848
111.180.190.199:31880
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
msedgewebview2.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3630502724-2561614198-3854231964-1000\Control Panel\International\Geo\Nation 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1952 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe Token: SeDebugPrivilege 3036 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1200 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 88 PID 3776 wrote to memory of 1200 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 88 PID 3776 wrote to memory of 3964 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 89 PID 3776 wrote to memory of 3964 3776 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 89 PID 1200 wrote to memory of 2244 1200 cmd.exe 92 PID 1200 wrote to memory of 2244 1200 cmd.exe 92 PID 3964 wrote to memory of 1952 3964 cmd.exe 93 PID 3964 wrote to memory of 1952 3964 cmd.exe 93 PID 3964 wrote to memory of 3036 3964 cmd.exe 101 PID 3964 wrote to memory of 3036 3964 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe"C:\Users\Admin\AppData\Local\Temp\2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msedgewebview2" /tr '"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msedgewebview2" /tr '"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7232.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1952
-
-
C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5ea471704a844517e763d778a9828ec52
SHA1de2e3cf49c898dfc335540ab06fde578c819b357
SHA2563e08193098deaab1899a2fa1319f7f0b27e773a5a90a5c95ad9785cdedbdbd61
SHA51207588494217446293d3bd50f942e826fe071105e8d225b81de56c13f5f4ea72b61ee0ad5f8ca36c27f3e30ac863517b29969ae9ea4a433b1396e375aff385054
-
Filesize
62KB
MD5852c0a85fbd6d9d052676efe8f12d69e
SHA1a828267cbe343c93f9453b28206ea259b9e02917
SHA2562fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae
SHA51226d2d61c5bb9258116ed94012186ea2c9666b301e1a76892401c11b2f649a30b1cb9dc5679d98293ff797eaaa49ecede09fb1ded8ce41e433660113dde3dc672