Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 08:29
Static task
static1
Behavioral task
behavioral1
Sample
payment confirmation_16.01.2021.exe
Resource
win7v20201028
General
-
Target
payment confirmation_16.01.2021.exe
-
Size
1.4MB
-
MD5
e3aea83c2ae72dfbaf7d887baa9d40da
-
SHA1
63b622b74f1e7ede93634c73d61384d431fbf199
-
SHA256
60f80dde8a53609fc7411854b9400a613c6978386ef05aa1bbedbfd2fc51814e
-
SHA512
100a267444667abf6e5ceb47157c92de523c6236fcdc07703c3b274f3e06ed35ab3a6040a87483e22d94758b35d71859df3dd2a22649cee9d41c2b05d6030eaa
Malware Config
Extracted
asyncrat
0.5.7B
bigman2021.duckdns.org:6606
bigman2021.duckdns.org:7707
bigman2021.duckdns.org:8808
79.134.225.18:6606
79.134.225.18:7707
79.134.225.18:8808
AsyncMutex_6SI8OkPnk
-
aes_key
8HLIxjjLl31oyeuCdupeIJlMgShc597W
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
bigman2021.duckdns.org,79.134.225.18
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6606,7707,8808
-
version
0.5.7B
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2640-14-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/2640-15-0x000000000040C76E-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
payment confirmation_16.01.2021.exedescription pid process target process PID 3132 set thread context of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
payment confirmation_16.01.2021.exepid process 3132 payment confirmation_16.01.2021.exe 3132 payment confirmation_16.01.2021.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
payment confirmation_16.01.2021.exedescription pid process Token: SeDebugPrivilege 3132 payment confirmation_16.01.2021.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
payment confirmation_16.01.2021.exedescription pid process target process PID 3132 wrote to memory of 4048 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 4048 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 4048 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe PID 3132 wrote to memory of 2640 3132 payment confirmation_16.01.2021.exe payment confirmation_16.01.2021.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"C:\Users\Admin\AppData\Local\Temp\payment confirmation_16.01.2021.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment confirmation_16.01.2021.exe.logMD5
65f1f0c7993639f9f9e1d524224a2c93
SHA15b51a6a56f3041dbc2d3f510252bbe68ffbbc59c
SHA256e582e80a644a998d1b2958bdcb0cd1e899076befa7c5e868d033b3fe75a2ca93
SHA5123e8953968bbc31f3105a0df28b95edfb4cee8af78ec527d47707b82e3d5fc2aa725fca574de3c963da53614e60d282408b21d075eed007be25679e9458bf1c23
-
memory/2640-14-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2640-20-0x0000000005870000-0x0000000005871000-memory.dmpFilesize
4KB
-
memory/2640-17-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/2640-15-0x000000000040C76E-mapping.dmp
-
memory/3132-7-0x0000000006FC0000-0x0000000006FC1000-memory.dmpFilesize
4KB
-
memory/3132-9-0x0000000007180000-0x0000000007181000-memory.dmpFilesize
4KB
-
memory/3132-10-0x00000000071F0000-0x00000000071F1000-memory.dmpFilesize
4KB
-
memory/3132-11-0x00000000079C0000-0x00000000079C1000-memory.dmpFilesize
4KB
-
memory/3132-12-0x00000000022A0000-0x00000000022B3000-memory.dmpFilesize
76KB
-
memory/3132-13-0x0000000004B00000-0x0000000004B81000-memory.dmpFilesize
516KB
-
memory/3132-8-0x0000000006EE0000-0x0000000006EE1000-memory.dmpFilesize
4KB
-
memory/3132-2-0x0000000073820000-0x0000000073F0E000-memory.dmpFilesize
6.9MB
-
memory/3132-6-0x00000000074C0000-0x00000000074C1000-memory.dmpFilesize
4KB
-
memory/3132-5-0x0000000006F20000-0x0000000006F21000-memory.dmpFilesize
4KB
-
memory/3132-3-0x0000000000070000-0x0000000000071000-memory.dmpFilesize
4KB