Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
31-07-2020 11:03
Static task
static1
Behavioral task
behavioral1
Sample
7a2e8d3fe9752412bf4de2e369d212ee.exe
Resource
win7
Behavioral task
behavioral2
Sample
7a2e8d3fe9752412bf4de2e369d212ee.exe
Resource
win10
General
-
Target
7a2e8d3fe9752412bf4de2e369d212ee.exe
-
Size
288KB
-
MD5
7a2e8d3fe9752412bf4de2e369d212ee
-
SHA1
02be732190a9828c1900659817f6a3db899fb3a0
-
SHA256
d9439aa56b6280ff50bc666ae94cdbfd6d174dda46187dbd0de25e9aeb6edbfb
-
SHA512
ba9cc252858e8c30dc6bd146e85d7a253cc8e391d4d50bd249ee65b1da5c4789bb354179788958add0dbea21801a2070fdd7870db2beaef60906645c10145a8e
Malware Config
Extracted
asyncrat
0.5.7B
giuseppe.ug:6970
asdxcvxdfgdnbvrwe.ru:6970
AsyncMutex_6SI8OkPnk
-
aes_key
wmNKpUVCpNWhhJQblim2nnNgKrbxeGKV
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
giuseppe.ug,asdxcvxdfgdnbvrwe.ru
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/340-7-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/340-8-0x000000000040C77E-mapping.dmp asyncrat behavioral1/memory/340-9-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/340-10-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7a2e8d3fe9752412bf4de2e369d212ee.exedescription pid process target process PID 1072 set thread context of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
7a2e8d3fe9752412bf4de2e369d212ee.exepid process 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7a2e8d3fe9752412bf4de2e369d212ee.exedescription pid process Token: SeDebugPrivilege 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
7a2e8d3fe9752412bf4de2e369d212ee.exedescription pid process target process PID 1072 wrote to memory of 1496 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe schtasks.exe PID 1072 wrote to memory of 1496 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe schtasks.exe PID 1072 wrote to memory of 1496 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe schtasks.exe PID 1072 wrote to memory of 1496 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe schtasks.exe PID 1072 wrote to memory of 1628 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 1628 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 1628 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 1628 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe PID 1072 wrote to memory of 340 1072 7a2e8d3fe9752412bf4de2e369d212ee.exe 7a2e8d3fe9752412bf4de2e369d212ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a2e8d3fe9752412bf4de2e369d212ee.exe"C:\Users\Admin\AppData\Local\Temp\7a2e8d3fe9752412bf4de2e369d212ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAFED.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\7a2e8d3fe9752412bf4de2e369d212ee.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7a2e8d3fe9752412bf4de2e369d212ee.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpAFED.tmpMD5
77fb853e8f745f44d1f5fd3577ce772f
SHA17ffc71dfb041c0e963f683674e36301e362b723e
SHA2560e57ac65e9146f47af2721b6824882ff549df9106874faf0e2f417eb555476e4
SHA5126a2963e9df68e0ec62c19d93ca56bd4086f11aca6249e333bddf1254149ad3b09077e0d67e77ed2dffd5ab8cedbbe26e643a2d8c50fba79994d4305b630b091a
-
memory/340-7-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/340-8-0x000000000040C77E-mapping.dmp
-
memory/340-9-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/340-10-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1072-1-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/1496-3-0x0000000000000000-mapping.dmp