Analysis
-
max time kernel
56s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 19:23
Behavioral task
behavioral1
Sample
b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe
Resource
win10v2004-20250410-en
General
-
Target
b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe
-
Size
48KB
-
MD5
b88243d04fee9d12f5f0cc6be853feee
-
SHA1
9f631d44a4859cc4b04497c4de839d8fc5d058eb
-
SHA256
b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44
-
SHA512
d755b92c3b95aef8faa9cd36408f9c02d57332ad48f7ac8de1aa34f807a62c93c82ce48f98442feb5c4e8002dff7701485db3ad030b8be261eeadb18cf158dc9
-
SSDEEP
768:Ouir1TUEFSuWUoV3kmo2qzcVrqQcQPaqLnaPI5HoIur0bcSvt/fNSp7klTWi8xK+:Ouir1TUKP23yKj5HozgbcSvxsp7klTWv
Malware Config
Extracted
asyncrat
0.5.8
Default
3.25.125.234:4782
n9S3XYaGvXp6
-
delay
3
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001a00000002b1d9-12.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 3040 System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1364 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe Token: SeDebugPrivilege 3040 System.exe Token: SeDebugPrivilege 3040 System.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4044 wrote to memory of 2092 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 79 PID 4044 wrote to memory of 2092 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 79 PID 4044 wrote to memory of 2092 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 79 PID 4044 wrote to memory of 4716 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 81 PID 4044 wrote to memory of 4716 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 81 PID 4044 wrote to memory of 4716 4044 b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe 81 PID 4716 wrote to memory of 1364 4716 cmd.exe 83 PID 4716 wrote to memory of 1364 4716 cmd.exe 83 PID 4716 wrote to memory of 1364 4716 cmd.exe 83 PID 2092 wrote to memory of 6080 2092 cmd.exe 84 PID 2092 wrote to memory of 6080 2092 cmd.exe 84 PID 2092 wrote to memory of 6080 2092 cmd.exe 84 PID 4716 wrote to memory of 3040 4716 cmd.exe 85 PID 4716 wrote to memory of 3040 4716 cmd.exe 85 PID 4716 wrote to memory of 3040 4716 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe"C:\Users\Admin\AppData\Local\Temp\b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEC63.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1364
-
-
C:\Users\Admin\AppData\Roaming\System.exe"C:\Users\Admin\AppData\Roaming\System.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5192ccd6273ae89399069d5f0a209a791
SHA189916bb942de54e6222cf2a1561a064e91c2bb98
SHA25680930bc5e0e2d49ba6e64c9a03c0ec47ba3efd3211d00376b2e9d476532d6a9d
SHA512432256d364b634861a36040e7a4983fa7e9282bca91eccfedacf65fc76a1cdcbb0c497f28ff03eb63d79da2ba4eb66bcc8f324ea6bc47d53f595107e00e08b81
-
Filesize
48KB
MD5b88243d04fee9d12f5f0cc6be853feee
SHA19f631d44a4859cc4b04497c4de839d8fc5d058eb
SHA256b01aec687a8d5626d17066b1a38c6b54516ee163e2b24b18fbb005bb92452e44
SHA512d755b92c3b95aef8faa9cd36408f9c02d57332ad48f7ac8de1aa34f807a62c93c82ce48f98442feb5c4e8002dff7701485db3ad030b8be261eeadb18cf158dc9