Analysis
-
max time kernel
45s -
max time network
55s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 19:46
Behavioral task
behavioral1
Sample
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe
Resource
win10v2004-20250410-en
General
-
Target
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe
-
Size
62KB
-
MD5
852c0a85fbd6d9d052676efe8f12d69e
-
SHA1
a828267cbe343c93f9453b28206ea259b9e02917
-
SHA256
2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae
-
SHA512
26d2d61c5bb9258116ed94012186ea2c9666b301e1a76892401c11b2f649a30b1cb9dc5679d98293ff797eaaa49ecede09fb1ded8ce41e433660113dde3dc672
-
SSDEEP
1536:C5gfnNsYMnl70qDzZeeCglUGbbXw6qO06HGTkpqKmY7k:C5gfnNsYMnl7XzMep+GbbXB9Svz3
Malware Config
Extracted
asyncrat
0.0.1
Default
127.0.0.1:8848
127.0.0.1:31880
111.180.190.199:8848
111.180.190.199:31880
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
msedgewebview2.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Executes dropped EXE 1 IoCs
pid Process 5188 msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 916 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe Token: SeDebugPrivilege 5188 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5900 wrote to memory of 5796 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 78 PID 5900 wrote to memory of 5796 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 78 PID 5900 wrote to memory of 4536 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 80 PID 5900 wrote to memory of 4536 5900 2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe 80 PID 5796 wrote to memory of 3036 5796 cmd.exe 82 PID 5796 wrote to memory of 3036 5796 cmd.exe 82 PID 4536 wrote to memory of 916 4536 cmd.exe 83 PID 4536 wrote to memory of 916 4536 cmd.exe 83 PID 4536 wrote to memory of 5188 4536 cmd.exe 84 PID 4536 wrote to memory of 5188 4536 cmd.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe"C:\Users\Admin\AppData\Local\Temp\2fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5900 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msedgewebview2" /tr '"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5796 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msedgewebview2" /tr '"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6939.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:916
-
-
C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"C:\Users\Admin\AppData\Roaming\msedgewebview2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD558a2d514bd9c2fa1eec48434bd155ce7
SHA1c29c499baa594ecf453683af8745686caa82cc87
SHA25654685089195dd7db5f671b88a2e6c3a32e879098f3c41345184457d8fdd8aa9c
SHA512d09e0417bb099855f21a043e3dbbe0a46926c0b95b219dbe5868b9a6e584fe991454d0b62e2ac7be05f3da7c7bd925790be829317ebefeb9d2fe1fc65a4ab65f
-
Filesize
62KB
MD5852c0a85fbd6d9d052676efe8f12d69e
SHA1a828267cbe343c93f9453b28206ea259b9e02917
SHA2562fcdea969160b033554d4b6c357f4dba20b83fb4dbec4763a908c6e981ba1eae
SHA51226d2d61c5bb9258116ed94012186ea2c9666b301e1a76892401c11b2f649a30b1cb9dc5679d98293ff797eaaa49ecede09fb1ded8ce41e433660113dde3dc672