Analysis
-
max time kernel
20s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-07-2021 00:11
Static task
static1
Behavioral task
behavioral1
Sample
Statement from NTXSD.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Statement from NTXSD.exe
Resource
win10v20210410
General
-
Target
Statement from NTXSD.exe
-
Size
231KB
-
MD5
bab69227c1d989368b0480224cdc7659
-
SHA1
67c0a6efd1180371a572d439a330c01bb71f49fc
-
SHA256
523110e3cb2270e27ac155a73ea6491a46ac6c8ef80f5d0172714298306415b4
-
SHA512
c0a83fc3760a17b2c3000dfbb6b2f7cbee6fc4f91af2c3d574f550bc5fe28a0f59426ff57852e176b9a7ab4ef85a5ceb9ff9e6d09b5d67ee06850e90e8cbf015
Malware Config
Extracted
asyncrat
0.5.7B
212.129.4.112:6606
212.129.4.112:7707
212.129.4.112:8808
51.75.191.89:6606
51.75.191.89:7707
51.75.191.89:8808
AsyncMutex_6SI8OkPnk
-
aes_key
hUpxNEHNQk3CtJdHJrTmysO9IVsvpbpS
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
212.129.4.112,51.75.191.89
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6606,7707,8808
-
version
0.5.7B
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1600-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1600-66-0x000000000040C73E-mapping.dmp asyncrat behavioral1/memory/1600-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Statement from NTXSD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\CiEXMHAdMxYExZrNHxMnINnDE = "C:\\Users\\Admin\\AppData\\Roaming\\ZTdRhRvNAqIXDvEmslgSRcHtT\\wAGZF.exe" Statement from NTXSD.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Statement from NTXSD.exedescription pid process target process PID 484 set thread context of 1600 484 Statement from NTXSD.exe RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Statement from NTXSD.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 484 Statement from NTXSD.exe Token: SeDebugPrivilege 1600 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Statement from NTXSD.exedescription pid process target process PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe PID 484 wrote to memory of 1600 484 Statement from NTXSD.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement from NTXSD.exe"C:\Users\Admin\AppData\Local\Temp\Statement from NTXSD.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/484-60-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/484-62-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/484-63-0x0000000000555000-0x0000000000566000-memory.dmpFilesize
68KB
-
memory/484-64-0x00000000089D0000-0x0000000008AE8000-memory.dmpFilesize
1.1MB
-
memory/1600-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1600-66-0x000000000040C73E-mapping.dmp
-
memory/1600-67-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1600-69-0x0000000075AD1000-0x0000000075AD3000-memory.dmpFilesize
8KB
-
memory/1600-70-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB