Analysis
-
max time kernel
148s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-07-2021 18:07
Behavioral task
behavioral1
Sample
ASTRO-GREP.bin.exe
Resource
win7v20210410
General
-
Target
ASTRO-GREP.bin.exe
-
Size
47KB
-
MD5
432f0e0aab658de046d8b41d2cef8253
-
SHA1
7ba5b175ffb4bb976c54177f9c40a7339a088654
-
SHA256
17d1c0045155ad9c523c07e0f37aa16cd036915f38b73090d8d8ba930db149fb
-
SHA512
bac97805d8fcba49b7bde5067911b293622c610a65f2a2fc527a6c890be8e79c6ca9c9676786b1eaac19ecbdb16562efee2d7c985707fc04e57e4e3033c75b0b
Malware Config
Extracted
asyncrat
0.5.7B
null:null
Mutex_6SI8OkPnk
-
aes_key
ZgOTIhSVzSTSosv4ITYrzailHXWOHyEM
-
anti_detection
true
-
autorun
true
-
bdos
false
-
delay
SWARM-SHOP
-
host
null
-
hwid
20
- install_file
-
install_folder
%AppData%
-
mutex
Mutex_6SI8OkPnk
-
pastebin_config
https://pastebin.com/raw/VTByvKGM
-
port
null
-
version
0.5.7B
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\astro-grep.exe asyncrat C:\Users\Admin\AppData\Roaming\astro-grep.exe asyncrat C:\Users\Admin\AppData\Roaming\astro-grep.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
astro-grep.exepid process 808 astro-grep.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 996 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1972 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ASTRO-GREP.bin.exepid process 1104 ASTRO-GREP.bin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ASTRO-GREP.bin.exeastro-grep.exedescription pid process Token: SeDebugPrivilege 1104 ASTRO-GREP.bin.exe Token: SeDebugPrivilege 808 astro-grep.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ASTRO-GREP.bin.execmd.execmd.exedescription pid process target process PID 1104 wrote to memory of 1128 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 1128 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 1128 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 1128 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 996 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 996 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 996 1104 ASTRO-GREP.bin.exe cmd.exe PID 1104 wrote to memory of 996 1104 ASTRO-GREP.bin.exe cmd.exe PID 1128 wrote to memory of 324 1128 cmd.exe schtasks.exe PID 1128 wrote to memory of 324 1128 cmd.exe schtasks.exe PID 1128 wrote to memory of 324 1128 cmd.exe schtasks.exe PID 1128 wrote to memory of 324 1128 cmd.exe schtasks.exe PID 996 wrote to memory of 1972 996 cmd.exe timeout.exe PID 996 wrote to memory of 1972 996 cmd.exe timeout.exe PID 996 wrote to memory of 1972 996 cmd.exe timeout.exe PID 996 wrote to memory of 1972 996 cmd.exe timeout.exe PID 996 wrote to memory of 808 996 cmd.exe astro-grep.exe PID 996 wrote to memory of 808 996 cmd.exe astro-grep.exe PID 996 wrote to memory of 808 996 cmd.exe astro-grep.exe PID 996 wrote to memory of 808 996 cmd.exe astro-grep.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ASTRO-GREP.bin.exe"C:\Users\Admin\AppData\Local\Temp\ASTRO-GREP.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "astro-grep" /tr '"C:\Users\Admin\AppData\Roaming\astro-grep.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "astro-grep" /tr '"C:\Users\Admin\AppData\Roaming\astro-grep.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp898.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\astro-grep.exe"C:\Users\Admin\AppData\Roaming\astro-grep.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp898.tmp.batMD5
fcbfaa89b344aa623d5b6bdc0a05c82c
SHA19d5fd0f2f786b06fc6eeb2dccd0e7a7d652c0d82
SHA2565e16f030cda2090ed44e432c43cd82205789ff584fbea5e36ee9dd17f7942e3b
SHA512f2f62e0f958bde7138450a1c5305650d5fb88654a1550b5af8d2844a60932f12b3999464bec0adb28d9f2945f4a860734067f318037e840024a50526fbe428c1
-
C:\Users\Admin\AppData\Roaming\astro-grep.exeMD5
432f0e0aab658de046d8b41d2cef8253
SHA17ba5b175ffb4bb976c54177f9c40a7339a088654
SHA25617d1c0045155ad9c523c07e0f37aa16cd036915f38b73090d8d8ba930db149fb
SHA512bac97805d8fcba49b7bde5067911b293622c610a65f2a2fc527a6c890be8e79c6ca9c9676786b1eaac19ecbdb16562efee2d7c985707fc04e57e4e3033c75b0b
-
C:\Users\Admin\AppData\Roaming\astro-grep.exeMD5
432f0e0aab658de046d8b41d2cef8253
SHA17ba5b175ffb4bb976c54177f9c40a7339a088654
SHA25617d1c0045155ad9c523c07e0f37aa16cd036915f38b73090d8d8ba930db149fb
SHA512bac97805d8fcba49b7bde5067911b293622c610a65f2a2fc527a6c890be8e79c6ca9c9676786b1eaac19ecbdb16562efee2d7c985707fc04e57e4e3033c75b0b
-
\Users\Admin\AppData\Roaming\astro-grep.exeMD5
432f0e0aab658de046d8b41d2cef8253
SHA17ba5b175ffb4bb976c54177f9c40a7339a088654
SHA25617d1c0045155ad9c523c07e0f37aa16cd036915f38b73090d8d8ba930db149fb
SHA512bac97805d8fcba49b7bde5067911b293622c610a65f2a2fc527a6c890be8e79c6ca9c9676786b1eaac19ecbdb16562efee2d7c985707fc04e57e4e3033c75b0b
-
memory/324-66-0x0000000000000000-mapping.dmp
-
memory/808-70-0x0000000000000000-mapping.dmp
-
memory/808-72-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/808-75-0x00000000043F0000-0x00000000043F1000-memory.dmpFilesize
4KB
-
memory/996-64-0x0000000000000000-mapping.dmp
-
memory/1104-59-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/1104-62-0x00000000011E0000-0x00000000011E1000-memory.dmpFilesize
4KB
-
memory/1104-61-0x0000000075EF1000-0x0000000075EF3000-memory.dmpFilesize
8KB
-
memory/1128-63-0x0000000000000000-mapping.dmp
-
memory/1972-67-0x0000000000000000-mapping.dmp