Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    02-07-2020 17:42

General

  • Target

    e2e89b28656886ead31cceb62f78b80b.exe

  • Size

    210KB

  • MD5

    e2e89b28656886ead31cceb62f78b80b

  • SHA1

    14f78bf703b0a20409f4f20d0241ff1d287963d9

  • SHA256

    7fcec6cab5ea7b810a492aca80f8286eaf595d7826dad8e642347353c8ef982f

  • SHA512

    054e52875c5974da2321438208aeec1854b52e386f13138792d4f0b102d58cd0a829020c3d17b68309a93a00a308b70b55598a5fa8273e9fe39f9cf6f1a68b84

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

migracion.linkpc.net:3468

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    OZ5Vq4Ybn4BuUPvvVZZKEF20GdI2yi3y

  • anti_detection

    false

  • autorun

    true

  • bdos

    false

  • delay

    Nuevas

  • host

    migracion.linkpc.net

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    3468

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2e89b28656886ead31cceb62f78b80b.exe
    "C:\Users\Admin\AppData\Local\Temp\e2e89b28656886ead31cceb62f78b80b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\AppData\Local\Temp\e2e89b28656886ead31cceb62f78b80b.exe
      "C:\Users\Admin\AppData\Local\Temp\e2e89b28656886ead31cceb62f78b80b.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Googlechromee" /tr '"C:\Users\Admin\AppData\Roaming\Googlechromee.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "Googlechromee" /tr '"C:\Users\Admin\AppData\Roaming\Googlechromee.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp847A.tmp.bat""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1448
        • C:\Users\Admin\AppData\Roaming\Googlechromee.exe
          "C:\Users\Admin\AppData\Roaming\Googlechromee.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:572
          • C:\Users\Admin\AppData\Roaming\Googlechromee.exe
            "C:\Users\Admin\AppData\Roaming\Googlechromee.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\juxcgf.exe"' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1492
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\juxcgf.exe"'
                7⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1656
                • C:\Users\Admin\AppData\Local\Temp\juxcgf.exe
                  "C:\Users\Admin\AppData\Local\Temp\juxcgf.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:368

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\juxcgf.exe
    MD5

    02172018da16d4d33a7d7c214f078b34

    SHA1

    50a4ec61a30f0e3c68db9ce2e32c4928c64e8722

    SHA256

    3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00

    SHA512

    c4011d54177ef2dd25dc5c76dde8581a139d95a5c879f8849726037e651fa5169662cbdb5aae0be074150be48514eef92be2e23af89ba57c452e706c2bea4466

  • C:\Users\Admin\AppData\Local\Temp\juxcgf.exe
    MD5

    02172018da16d4d33a7d7c214f078b34

    SHA1

    50a4ec61a30f0e3c68db9ce2e32c4928c64e8722

    SHA256

    3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00

    SHA512

    c4011d54177ef2dd25dc5c76dde8581a139d95a5c879f8849726037e651fa5169662cbdb5aae0be074150be48514eef92be2e23af89ba57c452e706c2bea4466

  • C:\Users\Admin\AppData\Local\Temp\tmp847A.tmp.bat
    MD5

    58ed494fcd0d7cc2be502e83b5aa1793

    SHA1

    65a0a33b107600b5d55a8fdce2550eb7ed0ed212

    SHA256

    69539f40a370d33504feb32eeca8ebadb359f2a27da5b3969a32c90cb020f54d

    SHA512

    9ff8b1020d04cb39c0a9b57cfe23f07a433cc74784379e1e18509bdef646ce790d3156644c7a5fef3925a29b06b70ba60f228b54f675235320a95bc4092201f2

  • C:\Users\Admin\AppData\Roaming\Googlechromee.exe
    MD5

    e2e89b28656886ead31cceb62f78b80b

    SHA1

    14f78bf703b0a20409f4f20d0241ff1d287963d9

    SHA256

    7fcec6cab5ea7b810a492aca80f8286eaf595d7826dad8e642347353c8ef982f

    SHA512

    054e52875c5974da2321438208aeec1854b52e386f13138792d4f0b102d58cd0a829020c3d17b68309a93a00a308b70b55598a5fa8273e9fe39f9cf6f1a68b84

  • C:\Users\Admin\AppData\Roaming\Googlechromee.exe
    MD5

    e2e89b28656886ead31cceb62f78b80b

    SHA1

    14f78bf703b0a20409f4f20d0241ff1d287963d9

    SHA256

    7fcec6cab5ea7b810a492aca80f8286eaf595d7826dad8e642347353c8ef982f

    SHA512

    054e52875c5974da2321438208aeec1854b52e386f13138792d4f0b102d58cd0a829020c3d17b68309a93a00a308b70b55598a5fa8273e9fe39f9cf6f1a68b84

  • C:\Users\Admin\AppData\Roaming\Googlechromee.exe
    MD5

    e2e89b28656886ead31cceb62f78b80b

    SHA1

    14f78bf703b0a20409f4f20d0241ff1d287963d9

    SHA256

    7fcec6cab5ea7b810a492aca80f8286eaf595d7826dad8e642347353c8ef982f

    SHA512

    054e52875c5974da2321438208aeec1854b52e386f13138792d4f0b102d58cd0a829020c3d17b68309a93a00a308b70b55598a5fa8273e9fe39f9cf6f1a68b84

  • \Users\Admin\AppData\Local\Temp\juxcgf.exe
    MD5

    02172018da16d4d33a7d7c214f078b34

    SHA1

    50a4ec61a30f0e3c68db9ce2e32c4928c64e8722

    SHA256

    3b02f2d57c40d4971283bf17b58de4574227c952b555590ef99a64d6b3faca00

    SHA512

    c4011d54177ef2dd25dc5c76dde8581a139d95a5c879f8849726037e651fa5169662cbdb5aae0be074150be48514eef92be2e23af89ba57c452e706c2bea4466

  • \Users\Admin\AppData\Roaming\Googlechromee.exe
    MD5

    e2e89b28656886ead31cceb62f78b80b

    SHA1

    14f78bf703b0a20409f4f20d0241ff1d287963d9

    SHA256

    7fcec6cab5ea7b810a492aca80f8286eaf595d7826dad8e642347353c8ef982f

    SHA512

    054e52875c5974da2321438208aeec1854b52e386f13138792d4f0b102d58cd0a829020c3d17b68309a93a00a308b70b55598a5fa8273e9fe39f9cf6f1a68b84

  • memory/368-30-0x0000000000000000-mapping.dmp
  • memory/572-13-0x0000000000000000-mapping.dmp
  • memory/572-14-0x0000000000000000-mapping.dmp
  • memory/640-9-0x0000000000000000-mapping.dmp
  • memory/772-7-0x0000000000000000-mapping.dmp
  • memory/828-1-0x0000000000000000-0x0000000000000000-disk.dmp
  • memory/1320-3-0x000000000040C75E-mapping.dmp
  • memory/1320-2-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1320-4-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1320-5-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1448-10-0x0000000000000000-mapping.dmp
  • memory/1492-23-0x0000000000000000-mapping.dmp
  • memory/1636-22-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1636-21-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1636-19-0x000000000040C75E-mapping.dmp
  • memory/1656-24-0x0000000000000000-mapping.dmp
  • memory/1656-25-0x0000000000000000-mapping.dmp
  • memory/1816-6-0x0000000000000000-mapping.dmp