Analysis
-
max time kernel
151s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-05-2021 11:43
Behavioral task
behavioral1
Sample
1ab91c6b55ef7fe9426448d1b365e919.exe
Resource
win7v20210408
General
-
Target
1ab91c6b55ef7fe9426448d1b365e919.exe
-
Size
47KB
-
MD5
1ab91c6b55ef7fe9426448d1b365e919
-
SHA1
a47527efb62e08131fadd1c0c321d1405688acde
-
SHA256
0953e07352cc9da191595f0dc233d4c04070b507f3503cf7cd62e6bb9a680ec7
-
SHA512
bf940cda054dcf7a117296dfec96683ad3b6b1d0a431caa171741630145df33d6f57f30b647c8fbbd04648fc716fba9ca78a673398b522e06b3a37a489a0c87f
Malware Config
Extracted
asyncrat
0.5.7B
cryptserver.hopto.org:4444
AsyncMutex_6SI8OkPnk
-
aes_key
eT1fq0d6dtymBNAUb6WLtqX26xciO5Sd
-
anti_detection
true
-
autorun
true
-
bdos
false
-
delay
Default
-
host
cryptserver.hopto.org
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
4444
-
version
0.5.7B
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00040000000130cb-70.dat asyncrat behavioral1/files/0x00040000000130cb-69.dat asyncrat behavioral1/files/0x00040000000130cb-72.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1012 update.exe -
Loads dropped DLL 1 IoCs
pid Process 544 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1636 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1840 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 1652 1ab91c6b55ef7fe9426448d1b365e919.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1652 1ab91c6b55ef7fe9426448d1b365e919.exe Token: SeDebugPrivilege 1012 update.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1032 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1652 wrote to memory of 1032 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1652 wrote to memory of 1032 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1652 wrote to memory of 1032 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 30 PID 1652 wrote to memory of 544 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1652 wrote to memory of 544 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1652 wrote to memory of 544 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1652 wrote to memory of 544 1652 1ab91c6b55ef7fe9426448d1b365e919.exe 32 PID 1032 wrote to memory of 1636 1032 cmd.exe 34 PID 1032 wrote to memory of 1636 1032 cmd.exe 34 PID 1032 wrote to memory of 1636 1032 cmd.exe 34 PID 1032 wrote to memory of 1636 1032 cmd.exe 34 PID 544 wrote to memory of 1840 544 cmd.exe 35 PID 544 wrote to memory of 1840 544 cmd.exe 35 PID 544 wrote to memory of 1840 544 cmd.exe 35 PID 544 wrote to memory of 1840 544 cmd.exe 35 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36 PID 544 wrote to memory of 1012 544 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ab91c6b55ef7fe9426448d1b365e919.exe"C:\Users\Admin\AppData\Local\Temp\1ab91c6b55ef7fe9426448d1b365e919.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Roaming\update.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Roaming\update.exe"'3⤵
- Creates scheduled task(s)
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8F64.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\update.exe"C:\Users\Admin\AppData\Roaming\update.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-