Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-07-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
877446a3230a1bdc809f50ad1477c3fd.exe
Resource
win7v20210410
General
-
Target
877446a3230a1bdc809f50ad1477c3fd.exe
-
Size
385KB
-
MD5
877446a3230a1bdc809f50ad1477c3fd
-
SHA1
54480aba9a090e9efb15695a55888c19b3dc183e
-
SHA256
d49479f1e5b04736f8bab7ff79f8cd3574234fa244b1f414b74b1fd91f87d1fb
-
SHA512
484c7dcf5a04f68f7b76ce5fee094cecf1353d0e46c9368b105cbe0b1fa18d18d584a679f4bbd95b658b898e668767ed69df546e411939141c158cfe2ed130b1
Malware Config
Extracted
asyncrat
0.5.7B
omomom.ac.ug:6970
omkarusdajvc.ac.ug:6970
6SI8OkPnkxzcasd
-
aes_key
sEiaxlqpFmHMU8l5j0Ycz8apFoEBTERY
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
XX
-
host
omomom.ac.ug,omkarusdajvc.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
6SI8OkPnkxzcasd
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3448-129-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/3448-130-0x000000000040C71E-mapping.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
877446a3230a1bdc809f50ad1477c3fd.exedescription pid process target process PID 772 set thread context of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
877446a3230a1bdc809f50ad1477c3fd.exedescription pid process target process PID 772 wrote to memory of 1332 772 877446a3230a1bdc809f50ad1477c3fd.exe schtasks.exe PID 772 wrote to memory of 1332 772 877446a3230a1bdc809f50ad1477c3fd.exe schtasks.exe PID 772 wrote to memory of 1332 772 877446a3230a1bdc809f50ad1477c3fd.exe schtasks.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe PID 772 wrote to memory of 3448 772 877446a3230a1bdc809f50ad1477c3fd.exe 877446a3230a1bdc809f50ad1477c3fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\877446a3230a1bdc809f50ad1477c3fd.exe"C:\Users\Admin\AppData\Local\Temp\877446a3230a1bdc809f50ad1477c3fd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\awXFuL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA55E.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\877446a3230a1bdc809f50ad1477c3fd.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA55E.tmpMD5
44389c2d8cde4a70120c766eb5ef6612
SHA1e6625705ff5c139f8ca4df8185170b128d0415f8
SHA2562121b3bf694d0e422841326d357a59305d22bd69ea8c448660b0b106d6383021
SHA5126bf20b1e8e0452669f91fd92dc7d16747d7c7a4c563cb431961f184fba60283bd572703219fb6c190079c1deddb1bb0932436fc9a9425820b14a1001e842619f
-
memory/772-123-0x0000000006290000-0x0000000006291000-memory.dmpFilesize
4KB
-
memory/772-122-0x00000000061E0000-0x00000000061E2000-memory.dmpFilesize
8KB
-
memory/772-118-0x0000000004C30000-0x0000000004C31000-memory.dmpFilesize
4KB
-
memory/772-119-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/772-124-0x0000000004B83000-0x0000000004B85000-memory.dmpFilesize
8KB
-
memory/772-121-0x000000000A4B0000-0x000000000A4B1000-memory.dmpFilesize
4KB
-
memory/772-117-0x00000000092E0000-0x00000000092E1000-memory.dmpFilesize
4KB
-
memory/772-114-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/772-120-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/772-125-0x0000000006AF0000-0x0000000006B59000-memory.dmpFilesize
420KB
-
memory/772-126-0x0000000004920000-0x0000000004939000-memory.dmpFilesize
100KB
-
memory/772-116-0x0000000004B20000-0x0000000004B62000-memory.dmpFilesize
264KB
-
memory/1332-127-0x0000000000000000-mapping.dmp
-
memory/3448-129-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3448-130-0x000000000040C71E-mapping.dmp
-
memory/3448-133-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB