Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 15:53
Static task
static1
Behavioral task
behavioral1
Sample
Production order List Quotation.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Production order List Quotation.pdf.exe
Resource
win10v20201028
General
-
Target
Production order List Quotation.pdf.exe
-
Size
874KB
-
MD5
30028635a4d6eaceee5c23499f73aa3a
-
SHA1
94ee1f211c7c5e14cf5835071cf16f239eefebd7
-
SHA256
e9b025c3083c60b1260f6c9b6909f3c80aa7861814b4cee817b5485bb9b3e700
-
SHA512
5a9597eeca40dd4ad0e82730608e8527c239e7459423f3b530e49cc0e174eaf79193865c0fa6e610c36b0ef353c4e35ddf290c95ea88b9dd82b27aeb8697f360
Malware Config
Extracted
asyncrat
0.5.7B
1.remcosagent.com:1993
AsyncMutex_6SI8OkPnk
-
aes_key
zfpcQBbFjdAkORcbNZ0s5ioknjh7mjo2
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
1.remcosagent.com
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
1993
-
version
0.5.7B
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
List.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\List.exe\"" List.exe -
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-19-0x000000000040C75E-mapping.dmp asyncrat behavioral1/memory/1076-18-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1076-21-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1076-22-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
Production.exeProduction.exeList.exepid process 1756 Production.exe 1076 Production.exe 272 List.exe -
Drops startup file 2 IoCs
Processes:
List.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\List.exe List.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\List.exe List.exe -
Loads dropped DLL 9 IoCs
Processes:
Production order List Quotation.pdf.exeProduction.exepid process 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe 1756 Production.exe 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe 2024 Production order List Quotation.pdf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
List.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\List.exe" List.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\List.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RarSFX0\\List.exe" List.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Production.exedescription pid process target process PID 1756 set thread context of 1076 1756 Production.exe Production.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Production.exepid process 1756 Production.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Production.exeProduction.exedescription pid process Token: SeDebugPrivilege 1756 Production.exe Token: SeDebugPrivilege 1076 Production.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 488 DllHost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Production order List Quotation.pdf.exeProduction.exedescription pid process target process PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 2024 wrote to memory of 1756 2024 Production order List Quotation.pdf.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 1756 wrote to memory of 1076 1756 Production.exe Production.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe PID 2024 wrote to memory of 272 2024 Production order List Quotation.pdf.exe List.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Production order List Quotation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Production order List Quotation.pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exe"{path}"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\List.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\List.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Order.jpgMD5
f2ff26db0c8cdad7840be73974c1ae11
SHA1fc0270b0cf43b66274b5fa0b2cb9bf6a96e9cb43
SHA2564153f7907b1e44f5bb4c9cc455504534a5025ce35d69cd1fa28ae1610efc383f
SHA512e1fe938108f9c4400662d13eaa597e98728bbbaeef324ba4100b357ffceb133ae06c134809e4f22c2338003f89a888f1a3afcc81bb227f54d6515876c24c20c6
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
\Users\Admin\AppData\Local\Temp\RarSFX0\List.exeMD5
0028087865f1e988b57381d704eb065c
SHA15b7582c2bc8497e95bedfc91c0365630363c1ca8
SHA2567d58d6c4528974565cb90c9434d635f495bd246b4ba716bf0ae4fc20277b3cc9
SHA512fbc07196eeb3d683ef94b18534a978a28ba5cdd5345185b9a55a83e2f000818b95f1ef0ea16387e78e99844466c8f82710b0886e3feaf7ab3cb910df1493a479
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Production.exeMD5
1013ec08102495056cb230adc003a216
SHA11c2d3fdebf59b64af64935387c13fc65703e2291
SHA2568b0f3de1f5501f809f673354c1497b76b8970a8d8f199596b7ee04eee3b6786a
SHA51221abb1139625e8bb60e1b12372818dd17cd7a2c74bae126a98ff8ee0e75fc104ea7d7cc676faaf98b48e450036c04e72b133e13d528538d00377f98d7c601af3
-
memory/272-36-0x0000000000310000-0x000000000032E000-memory.dmpFilesize
120KB
-
memory/272-34-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/272-33-0x0000000073500000-0x0000000073BEE000-memory.dmpFilesize
6.9MB
-
memory/272-30-0x0000000000000000-mapping.dmp
-
memory/1076-19-0x000000000040C75E-mapping.dmp
-
memory/1076-23-0x0000000073500000-0x0000000073BEE000-memory.dmpFilesize
6.9MB
-
memory/1076-22-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1076-21-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1076-18-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1756-8-0x0000000000000000-mapping.dmp
-
memory/1756-12-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1756-16-0x0000000000D50000-0x0000000000D79000-memory.dmpFilesize
164KB
-
memory/1756-11-0x0000000073500000-0x0000000073BEE000-memory.dmpFilesize
6.9MB
-
memory/1756-14-0x0000000000530000-0x000000000053E000-memory.dmpFilesize
56KB
-
memory/2024-2-0x0000000001F70000-0x0000000002071000-memory.dmpFilesize
1.0MB