Analysis
-
max time kernel
147s -
max time network
201s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-07-2021 10:03
Static task
static1
Behavioral task
behavioral1
Sample
b0b110907b803c315662fafcf1893595.exe
Resource
win7v20210410
General
-
Target
b0b110907b803c315662fafcf1893595.exe
-
Size
525KB
-
MD5
b0b110907b803c315662fafcf1893595
-
SHA1
f3afc612ea9b2aeecacb4b4e1792b6b1800ef870
-
SHA256
2f26650c608fd0f9a206313627fc9274e5149f3a91000a4efd22edad7e66a380
-
SHA512
e3beb668ce9745064a6f74df99ef45bfab1cb4f908a9628174e506d725a00ca9c4c2c875cd6e2b4659bcfe596adf05715e4842286cada05ab7f20396b181ba19
Malware Config
Extracted
asyncrat
0.5.7B
icando.ug:6970
icacxndo.ac.ug:6970
6SI8OkPnkxzcasd
-
aes_key
rkDO6u9Rg2tQZ5crWRxI7ttwjOqPWDog
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
XX
-
host
icando.ug,icacxndo.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
6SI8OkPnkxzcasd
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1584-68-0x000000000040C71E-mapping.dmp asyncrat behavioral1/memory/1584-69-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0b110907b803c315662fafcf1893595.exedescription pid process target process PID 1028 set thread context of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
b0b110907b803c315662fafcf1893595.exedescription pid process target process PID 1028 wrote to memory of 528 1028 b0b110907b803c315662fafcf1893595.exe schtasks.exe PID 1028 wrote to memory of 528 1028 b0b110907b803c315662fafcf1893595.exe schtasks.exe PID 1028 wrote to memory of 528 1028 b0b110907b803c315662fafcf1893595.exe schtasks.exe PID 1028 wrote to memory of 528 1028 b0b110907b803c315662fafcf1893595.exe schtasks.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe PID 1028 wrote to memory of 1584 1028 b0b110907b803c315662fafcf1893595.exe b0b110907b803c315662fafcf1893595.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b110907b803c315662fafcf1893595.exe"C:\Users\Admin\AppData\Local\Temp\b0b110907b803c315662fafcf1893595.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ddoAzF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp49FB.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\b0b110907b803c315662fafcf1893595.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp49FB.tmpMD5
8d623187b28ca9c7e6abe0f9b67b3869
SHA1d2f570a8866b729f40c0affafad8758d9139ddee
SHA256c477c91808f1182ce06eb0e0f52a41980d5d822e8c7db4377e670274505cca46
SHA5127c46cab850c9835096e45583c73abb08cfc7249b1e475dc8afdf64f2e4951ca9d014d00ed45fdbb961dc274d7bfe01a783b2b893304ccc1daebb38fb57e33bbc
-
memory/528-65-0x0000000000000000-mapping.dmp
-
memory/1028-59-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/1028-61-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/1028-62-0x00000000003A0000-0x00000000003A2000-memory.dmpFilesize
8KB
-
memory/1028-63-0x0000000005920000-0x00000000059A1000-memory.dmpFilesize
516KB
-
memory/1028-64-0x00000000005C0000-0x00000000005F0000-memory.dmpFilesize
192KB
-
memory/1584-67-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1584-68-0x000000000040C71E-mapping.dmp
-
memory/1584-69-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1584-71-0x0000000075591000-0x0000000075593000-memory.dmpFilesize
8KB
-
memory/1584-72-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB