Resubmissions

17-01-2021 18:39

210117-bjkp449bn2 10

15-01-2021 19:39

210115-bg5rm9rr5s 10

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-01-2021 19:39

General

  • Target

    INV_FG59.EXE

  • Size

    1.2MB

  • MD5

    97995b3f92bf70117841d386fe556497

  • SHA1

    b817858dbe60a1975adbb7fa00524a65f38077e0

  • SHA256

    02d0d2a6ee7f1e728599f0e16ff5bb3618a67fd63d0cb1f20a90ac2fe8eca670

  • SHA512

    ab4a84fcd4b1bc7f73a22f671d65cb3ba2c5c396fc88d1db23cd641467961186fbfe530288e1fb548170b7af9bffbc620ca486d86ae5629908f64241246b8399

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

54.36.220.171:7707

54.36.220.171:8808

54.36.220.171:5050

Mutex

Mutex_6SI8OkPnk

Attributes
  • aes_key

    DiOIHNqQSoNMUZLXqq4Zuqb1foyxPfJ1

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    last_Last

  • host

    54.36.220.171

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    Mutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    7707,8808,5050

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Async RAT payload 4 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Delays execution with timeout.exe 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INV_FG59.EXE
    "C:\Users\Admin\AppData\Local\Temp\INV_FG59.EXE"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:1400
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:296
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:828
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:624
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1008

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/296-16-0x0000000000000000-mapping.dmp
    • memory/624-19-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/624-22-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/624-24-0x0000000074900000-0x0000000074FEE000-memory.dmp
      Filesize

      6.9MB

    • memory/624-20-0x000000000040C6DE-mapping.dmp
    • memory/624-21-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/828-18-0x0000000000000000-mapping.dmp
    • memory/1036-10-0x0000000000570000-0x0000000000581000-memory.dmp
      Filesize

      68KB

    • memory/1036-12-0x0000000000500000-0x0000000000526000-memory.dmp
      Filesize

      152KB

    • memory/1036-3-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/1036-5-0x0000000000570000-0x0000000000581000-memory.dmp
      Filesize

      68KB

    • memory/1036-23-0x0000000000400000-0x0000000000410000-memory.dmp
      Filesize

      64KB

    • memory/1036-2-0x0000000074900000-0x0000000074FEE000-memory.dmp
      Filesize

      6.9MB

    • memory/1400-14-0x0000000000000000-mapping.dmp
    • memory/1484-17-0x0000000000000000-mapping.dmp
    • memory/1660-15-0x0000000000000000-mapping.dmp
    • memory/1684-13-0x0000000000000000-mapping.dmp