Analysis
-
max time kernel
44s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 07:21
Static task
static1
Behavioral task
behavioral1
Sample
Production order List Quotation.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Production order List Quotation.pdf.exe
Resource
win10v20201028
General
-
Target
Production order List Quotation.pdf.exe
-
Size
924KB
-
MD5
bc078bc0b438d5186ff9a7580412a532
-
SHA1
25730487e2562435cd053891ec689a9b8b380399
-
SHA256
8f74c5871c33b4bf63b43f3e7e216dae1cc92e79cd0035422c8eb6768b98dc06
-
SHA512
d85a642736695dbe8645773ea8fb20a14b6c44b1892a136d149c2aa839d2e8ac165362e94b879930945f416e42f9a29874970a998820008e050613f3267f213a
Malware Config
Extracted
asyncrat
0.5.7B
1.remcosagent.com:1993
AsyncMutex_6SI8OkPnk
-
aes_key
zfpcQBbFjdAkORcbNZ0s5ioknjh7mjo2
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
1.remcosagent.com
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
1993
-
version
0.5.7B
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-16-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1384-17-0x000000000040C75E-mapping.dmp asyncrat behavioral1/memory/1384-19-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1384-20-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
Production.exeProduction.exepid process 1788 Production.exe 1384 Production.exe -
Loads dropped DLL 5 IoCs
Processes:
Production order List Quotation.pdf.exeProduction.exepid process 844 Production order List Quotation.pdf.exe 844 Production order List Quotation.pdf.exe 844 Production order List Quotation.pdf.exe 844 Production order List Quotation.pdf.exe 1788 Production.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Production.exedescription pid process target process PID 1788 set thread context of 1384 1788 Production.exe Production.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Production.exeProduction.exedescription pid process Token: SeDebugPrivilege 1788 Production.exe Token: SeDebugPrivilege 1384 Production.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1124 DllHost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Production order List Quotation.pdf.exeProduction.exedescription pid process target process PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 844 wrote to memory of 1788 844 Production order List Quotation.pdf.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe PID 1788 wrote to memory of 1384 1788 Production.exe Production.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Production order List Quotation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Production order List Quotation.pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Order.jpgMD5
f2ff26db0c8cdad7840be73974c1ae11
SHA1fc0270b0cf43b66274b5fa0b2cb9bf6a96e9cb43
SHA2564153f7907b1e44f5bb4c9cc455504534a5025ce35d69cd1fa28ae1610efc383f
SHA512e1fe938108f9c4400662d13eaa597e98728bbbaeef324ba4100b357ffceb133ae06c134809e4f22c2338003f89a888f1a3afcc81bb227f54d6515876c24c20c6
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
6e8a968b726212ff3e15dfb610ea73b1
SHA16e26a4cd55d6c7962b9e618174be4bc42ed064a2
SHA256d45c910a95258d87e853b82baa1fdb6cba6ad727a6c57e2520cdb3ae882f9c98
SHA512365e880a2dbf074b63b6b732777b86f57b8e9d82f05d1f82e82c8556b63f0916ef4723b10bb3d0b31c1d1451c6299ac93b100ec8496398011d2c0b934927b72e
-
memory/1384-21-0x00000000737A0000-0x0000000073E8E000-memory.dmpFilesize
6.9MB
-
memory/1384-20-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1384-19-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1384-17-0x000000000040C75E-mapping.dmp
-
memory/1384-16-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1788-6-0x0000000000000000-mapping.dmp
-
memory/1788-14-0x00000000007D0000-0x00000000007F9000-memory.dmpFilesize
164KB
-
memory/1788-12-0x00000000003F0000-0x00000000003FE000-memory.dmpFilesize
56KB
-
memory/1788-10-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1788-9-0x00000000737A0000-0x0000000073E8E000-memory.dmpFilesize
6.9MB