Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2025, 19:18
Behavioral task
behavioral1
Sample
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe
Resource
win10v2004-20250313-en
General
-
Target
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe
-
Size
47KB
-
MD5
8a157f3fc0ea3d6b8644b918b610947e
-
SHA1
095c33d5b86fd75d76619cffd6259badb5d1b03e
-
SHA256
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
-
SHA512
f2584732363237d6e409c6f0c0c7f038c67df2ae31df92bbed3431afa60495955b896d8a5bf7a913c876e5c7446b9fedab70d040832b82b32dbc5d43c461fc38
-
SSDEEP
768:6uW81Towx/9WU9Vt+Xmo2qzgTRVTzuuSPIG5RorYKN8n5b0bK78dpNXbpl3rePD+:6uW81Toq7C2fFz97kRaYKN3bK4dfXaF8
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.tcp.eu.ngrok.io:15310
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Valorantbuild.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000024137-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe -
Executes dropped EXE 1 IoCs
pid Process 4888 Valorantbuild.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 5.tcp.eu.ngrok.io 38 5.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Valorantbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4592 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe Token: SeDebugPrivilege 4888 Valorantbuild.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4928 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 92 PID 4820 wrote to memory of 4928 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 92 PID 4820 wrote to memory of 4928 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 92 PID 4820 wrote to memory of 4456 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 94 PID 4820 wrote to memory of 4456 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 94 PID 4820 wrote to memory of 4456 4820 fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe 94 PID 4928 wrote to memory of 4564 4928 cmd.exe 96 PID 4928 wrote to memory of 4564 4928 cmd.exe 96 PID 4928 wrote to memory of 4564 4928 cmd.exe 96 PID 4456 wrote to memory of 4592 4456 cmd.exe 97 PID 4456 wrote to memory of 4592 4456 cmd.exe 97 PID 4456 wrote to memory of 4592 4456 cmd.exe 97 PID 4456 wrote to memory of 4888 4456 cmd.exe 99 PID 4456 wrote to memory of 4888 4456 cmd.exe 99 PID 4456 wrote to memory of 4888 4456 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe"C:\Users\Admin\AppData\Local\Temp\fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Valorantbuild" /tr '"C:\Users\Admin\AppData\Roaming\Valorantbuild.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Valorantbuild" /tr '"C:\Users\Admin\AppData\Roaming\Valorantbuild.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBA18.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4592
-
-
C:\Users\Admin\AppData\Roaming\Valorantbuild.exe"C:\Users\Admin\AppData\Roaming\Valorantbuild.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5425e1b7b9d64f3812284a0c407d78947
SHA1476e65459255b359cce46ad76ba67c71da3678e8
SHA25639509bbbdcbf49df70da4bc7ba781726c68985bfa32c96835d8358077f39a491
SHA5122cbfe6c82ef3efb32b2c0239359a8be939c235efea2550a6c12fb5bc0c3181b74515c7bdd2d6b3e26aeb46a25a0dc4c158fb96f289ec0781ee4a44e3ede63e9f
-
Filesize
47KB
MD58a157f3fc0ea3d6b8644b918b610947e
SHA1095c33d5b86fd75d76619cffd6259badb5d1b03e
SHA256fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
SHA512f2584732363237d6e409c6f0c0c7f038c67df2ae31df92bbed3431afa60495955b896d8a5bf7a913c876e5c7446b9fedab70d040832b82b32dbc5d43c461fc38