Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 19:53
Behavioral task
behavioral1
Sample
4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe
Resource
win10v2004-20250410-en
General
-
Target
4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe
-
Size
158KB
-
MD5
eb756258e1322cd4b060dcdfc085ebe7
-
SHA1
b759aa7f5e5bec72de79285807abc2a70edfc6b4
-
SHA256
4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664
-
SHA512
45e1c54e3b58bac98d1419f861fedeabc6492f749b3b3a33ea29f6b909980717b08fa7eaffa58b89325e4104ece0188195e8ec969dca8aad193ba6dae1a7f74d
-
SSDEEP
3072:XTXjVWYUbX3ThRwQTY7/s2uxw6XnZOQ6PGy1vIowkWh9TAHec8MUO/z:ULbHluQk/sFxNpOQ+dbwXvvc8Vu
Malware Config
Extracted
asyncrat
Default
127.0.0.1:2284
127.0.0.1:44844
boards-essential.gl.at.ply.gg:2284
boards-essential.gl.at.ply.gg:44844
-
delay
1
-
install
true
-
install_file
Svhost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001d00000002b252-11.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1324 Svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2164 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe Token: SeDebugPrivilege 1324 Svhost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2360 wrote to memory of 5012 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 78 PID 2360 wrote to memory of 5012 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 78 PID 2360 wrote to memory of 3360 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 80 PID 2360 wrote to memory of 3360 2360 4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe 80 PID 5012 wrote to memory of 1224 5012 cmd.exe 82 PID 5012 wrote to memory of 1224 5012 cmd.exe 82 PID 3360 wrote to memory of 2164 3360 cmd.exe 83 PID 3360 wrote to memory of 2164 3360 cmd.exe 83 PID 3360 wrote to memory of 1324 3360 cmd.exe 84 PID 3360 wrote to memory of 1324 3360 cmd.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe"C:\Users\Admin\AppData\Local\Temp\4f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Svhost" /tr '"C:\Users\Admin\AppData\Roaming\Svhost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Svhost" /tr '"C:\Users\Admin\AppData\Roaming\Svhost.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7F90.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\Svhost.exe"C:\Users\Admin\AppData\Roaming\Svhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5639791a1a4a2f3089607ac2c76cac78d
SHA107641a6c919babf829b9add25c3f290558bc35ed
SHA2564dfd56f38a8d081ceab5beb24d2d9dfde54fdab6edf68f689cb8f2a0d0c76f54
SHA512bb110381e7b0650e0491350f915df9442bac84a16d4dfb421246d4db77df5ee618585076c370d352836fe032371b917c2df1d1d7427491a4b09fc0e7b8b14970
-
Filesize
158KB
MD5eb756258e1322cd4b060dcdfc085ebe7
SHA1b759aa7f5e5bec72de79285807abc2a70edfc6b4
SHA2564f213ab47d27a65804ea21290d330c85037124e9b7f77f03cde447b9db7b2664
SHA51245e1c54e3b58bac98d1419f861fedeabc6492f749b3b3a33ea29f6b909980717b08fa7eaffa58b89325e4104ece0188195e8ec969dca8aad193ba6dae1a7f74d