Analysis
-
max time kernel
17s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 15:11
Behavioral task
behavioral1
Sample
04d0649b4bfa1dfeae3a8c86453397a3.exe
Resource
win7v20210410
General
-
Target
04d0649b4bfa1dfeae3a8c86453397a3.exe
-
Size
45KB
-
MD5
04d0649b4bfa1dfeae3a8c86453397a3
-
SHA1
f47a6585df4bbb264017cacbb11a2d0e88fcea84
-
SHA256
26b9ff2aea0f6bb6e98627a46effb1d6f0c72908fc2fa4985a72a4d199ac0870
-
SHA512
e2c7ab0d8b80f3b2ae4369177d654011b75cd288e855724cee2dd64af45dff81e12d5a5ba72c075c6d48291f79b83a3cf120c068c90f01ddf36e5ae88901ab68
Malware Config
Extracted
asyncrat
0.5.7B
8.tcp.ngrok.io:18318
AsyncMutex_6SI8OkPnk
-
aes_key
v4WrWlQmMr9Nbg46PqpYZ1ZQie6iSq6f
-
anti_detection
false
-
autorun
true
-
bdos
false
-
delay
Default
-
host
8.tcp.ngrok.io
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
18318
-
version
0.5.7B
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab74-124.dat asyncrat behavioral2/files/0x000500000001ab74-125.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2720 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 932 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2004 timeout.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe Token: SeDebugPrivilege 2720 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3952 wrote to memory of 1236 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 78 PID 3952 wrote to memory of 1236 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 78 PID 3952 wrote to memory of 1236 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 78 PID 3952 wrote to memory of 184 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 80 PID 3952 wrote to memory of 184 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 80 PID 3952 wrote to memory of 184 3952 04d0649b4bfa1dfeae3a8c86453397a3.exe 80 PID 184 wrote to memory of 2004 184 cmd.exe 82 PID 184 wrote to memory of 2004 184 cmd.exe 82 PID 184 wrote to memory of 2004 184 cmd.exe 82 PID 1236 wrote to memory of 932 1236 cmd.exe 83 PID 1236 wrote to memory of 932 1236 cmd.exe 83 PID 1236 wrote to memory of 932 1236 cmd.exe 83 PID 184 wrote to memory of 2720 184 cmd.exe 84 PID 184 wrote to memory of 2720 184 cmd.exe 84 PID 184 wrote to memory of 2720 184 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d0649b4bfa1dfeae3a8c86453397a3.exe"C:\Users\Admin\AppData\Local\Temp\04d0649b4bfa1dfeae3a8c86453397a3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3C05.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2004
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-