Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-05-2021 12:01
Behavioral task
behavioral1
Sample
1ab91c6b55ef7fe9426448d1b365e919.exe
Resource
win7v20210410
General
-
Target
1ab91c6b55ef7fe9426448d1b365e919.exe
-
Size
47KB
-
MD5
1ab91c6b55ef7fe9426448d1b365e919
-
SHA1
a47527efb62e08131fadd1c0c321d1405688acde
-
SHA256
0953e07352cc9da191595f0dc233d4c04070b507f3503cf7cd62e6bb9a680ec7
-
SHA512
bf940cda054dcf7a117296dfec96683ad3b6b1d0a431caa171741630145df33d6f57f30b647c8fbbd04648fc716fba9ca78a673398b522e06b3a37a489a0c87f
Malware Config
Extracted
asyncrat
0.5.7B
cryptserver.hopto.org:4444
AsyncMutex_6SI8OkPnk
-
aes_key
eT1fq0d6dtymBNAUb6WLtqX26xciO5Sd
-
anti_detection
true
-
autorun
true
-
bdos
false
-
delay
Default
-
host
cryptserver.hopto.org
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
4444
-
version
0.5.7B
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00040000000130f6-69.dat asyncrat behavioral1/files/0x00040000000130f6-70.dat asyncrat behavioral1/files/0x00040000000130f6-72.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 632 update.exe -
Loads dropped DLL 1 IoCs
pid Process 1856 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 680 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1620 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 1104 1ab91c6b55ef7fe9426448d1b365e919.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1104 1ab91c6b55ef7fe9426448d1b365e919.exe Token: SeDebugPrivilege 632 update.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1104 wrote to memory of 804 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1104 wrote to memory of 804 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1104 wrote to memory of 804 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1104 wrote to memory of 804 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1104 wrote to memory of 1856 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1104 wrote to memory of 1856 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1104 wrote to memory of 1856 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1104 wrote to memory of 1856 1104 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 804 wrote to memory of 680 804 cmd.exe 34 PID 804 wrote to memory of 680 804 cmd.exe 34 PID 804 wrote to memory of 680 804 cmd.exe 34 PID 804 wrote to memory of 680 804 cmd.exe 34 PID 1856 wrote to memory of 1620 1856 cmd.exe 35 PID 1856 wrote to memory of 1620 1856 cmd.exe 35 PID 1856 wrote to memory of 1620 1856 cmd.exe 35 PID 1856 wrote to memory of 1620 1856 cmd.exe 35 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36 PID 1856 wrote to memory of 632 1856 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ab91c6b55ef7fe9426448d1b365e919.exe"C:\Users\Admin\AppData\Local\Temp\1ab91c6b55ef7fe9426448d1b365e919.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Roaming\update.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Roaming\update.exe"'3⤵
- Creates scheduled task(s)
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2EBE.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1620
-
-
C:\Users\Admin\AppData\Roaming\update.exe"C:\Users\Admin\AppData\Roaming\update.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-