Resubmissions

17-01-2021 18:39

210117-bjkp449bn2 10

15-01-2021 19:39

210115-bg5rm9rr5s 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-01-2021 19:39

General

  • Target

    INV_FG59.EXE

  • Size

    1.2MB

  • MD5

    97995b3f92bf70117841d386fe556497

  • SHA1

    b817858dbe60a1975adbb7fa00524a65f38077e0

  • SHA256

    02d0d2a6ee7f1e728599f0e16ff5bb3618a67fd63d0cb1f20a90ac2fe8eca670

  • SHA512

    ab4a84fcd4b1bc7f73a22f671d65cb3ba2c5c396fc88d1db23cd641467961186fbfe530288e1fb548170b7af9bffbc620ca486d86ae5629908f64241246b8399

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

54.36.220.171:7707

54.36.220.171:8808

54.36.220.171:5050

Mutex

Mutex_6SI8OkPnk

Attributes
  • aes_key

    DiOIHNqQSoNMUZLXqq4Zuqb1foyxPfJ1

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    last_Last

  • host

    54.36.220.171

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    Mutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    7707,8808,5050

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Async RAT payload 2 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Delays execution with timeout.exe 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INV_FG59.EXE
    "C:\Users\Admin\AppData\Local\Temp\INV_FG59.EXE"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:2728
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:3548
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:1500
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1600
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3808

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-14-0x0000000000000000-mapping.dmp
  • memory/652-3-0x0000000000550000-0x0000000000551000-memory.dmp
    Filesize

    4KB

  • memory/652-5-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/652-6-0x00000000055E0000-0x00000000055E1000-memory.dmp
    Filesize

    4KB

  • memory/652-7-0x00000000052C0000-0x00000000052C1000-memory.dmp
    Filesize

    4KB

  • memory/652-8-0x0000000005020000-0x0000000005021000-memory.dmp
    Filesize

    4KB

  • memory/652-9-0x00000000051E0000-0x0000000005206000-memory.dmp
    Filesize

    152KB

  • memory/652-2-0x0000000073FF0000-0x00000000746DE000-memory.dmp
    Filesize

    6.9MB

  • memory/1500-15-0x0000000000000000-mapping.dmp
  • memory/2136-12-0x0000000000000000-mapping.dmp
  • memory/2656-16-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2656-17-0x000000000040C6DE-mapping.dmp
  • memory/2656-18-0x0000000073FF0000-0x00000000746DE000-memory.dmp
    Filesize

    6.9MB

  • memory/2656-26-0x0000000005840000-0x0000000005841000-memory.dmp
    Filesize

    4KB

  • memory/2728-11-0x0000000000000000-mapping.dmp
  • memory/3272-10-0x0000000000000000-mapping.dmp
  • memory/3548-13-0x0000000000000000-mapping.dmp
  • memory/3808-21-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB