Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-07-2021 17:41

General

  • Target

    2f858b2cdd1332777a75cb98481fe425.exe

  • Size

    262KB

  • MD5

    2f858b2cdd1332777a75cb98481fe425

  • SHA1

    3ff58b35d77a3f9759aad0168a52d95d6eb21643

  • SHA256

    ba3c244413f003bbd093b5e3e082bb9b0914d5bd9e03526b0e4b4faf4eacc411

  • SHA512

    57ba0490b16b4205ca328aebbbafa181dca48f24e3668e40e099922bde363571bbe6f8ee5f35059b7cdafdf1cece6e23c8926c0b7658076d827a033f3a9a8844

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
  • Async RAT payload 2 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f858b2cdd1332777a75cb98481fe425.exe
    "C:\Users\Admin\AppData\Local\Temp\2f858b2cdd1332777a75cb98481fe425.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b0emybft\b0emybft.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7219.tmp" "c:\Users\Admin\AppData\Local\Temp\b0emybft\CSCD69476789DD402D891B26519471B16C.TMP"
        3⤵
          PID:4080
      • C:\Windows\SYSTEM32\netsh.exe
        "netsh.exe" firewall add allowedprogram C:\Users\Admin\AppData\Local\Temp\2f858b2cdd1332777a75cb98481fe425.exe SystemUpdate ENABLE
        2⤵
          PID:2980
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -enc 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
          2⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2976

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES7219.tmp
        MD5

        ab3580c7fbec130ccf90c59128cb8a34

        SHA1

        f46fe07432ee1bd7fb1ab4aedfbb132c0ac3d75f

        SHA256

        717ab895c16105353a87309e47573f31033e028e5b2ccffbc01bbcb3fd1c4a99

        SHA512

        bc779e567e9a1d5eaf47937bbf4b051dbfee4b33a63f8a0e89c984955bfb90be69654bcc04afbe4fb3e61dbd73224b05e952c06f74ece32f8961787e8eaa5b61

      • C:\Users\Admin\AppData\Local\Temp\b0emybft\b0emybft.dll
        MD5

        df2a87895e458f8b1ec381ae55ff2857

        SHA1

        79a8ac3f2b0316f43a694057ff6315a9f04caf36

        SHA256

        461f8f2ac563c037db54483b19ea7fccf466a926f633c0a9d67079cc6246cb9a

        SHA512

        13a960f4ed3b4d54913dec06bf925b8619b3cc9df9b79dff4a5d3f1029032a1173e9aa61b06d8eb841eaeb71f317643bf2eee64163b48b6acf04b970d731be39

      • \??\c:\Users\Admin\AppData\Local\Temp\b0emybft\CSCD69476789DD402D891B26519471B16C.TMP
        MD5

        a11d9feafbb97902e664740357f1a57c

        SHA1

        2be85009c4d8ad7bf356529e8afd8b1c1e21f498

        SHA256

        58875fd2646a569fa2d4aa0cf88f8a58d39b409774b85836305692df4955e7d1

        SHA512

        43da7676936e089c2d298e065af45d555cad5000356a5011cf6bef4ab33bd8d566c3a97847c4af45f48731c09c7086d140085d9d4fb5202b58c1d43ae20f23ba

      • \??\c:\Users\Admin\AppData\Local\Temp\b0emybft\b0emybft.0.cs
        MD5

        eb9d1ba75e2a29b96e3c75b73b41df4c

        SHA1

        093bd046abe146fc1fffe45f073e0306d365ccbf

        SHA256

        12480589381d69c1eb1abd50b4eaa33b49dcacbef78e358a757d1d7d11de3bda

        SHA512

        f03442a0fff3b85ff37d44f071366ea97884f48675433f967317d656dc8e00b184bc51c63c39987fd310a763d1dd9beb8878e0445edc3aa76fd6f62aba94571f

      • \??\c:\Users\Admin\AppData\Local\Temp\b0emybft\b0emybft.cmdline
        MD5

        f4664a4f6d6c395d7a13d5932540ee0f

        SHA1

        9f0b368d31880cb1bad8cb073221e5425f807d08

        SHA256

        450d90515874602c54e4d94fa30b2b4b71b0a193365c46d5ae47d2a6b614b785

        SHA512

        a3253c397d62b548e0aef140b59e4c934f09ffc9486788409da15fdbd5c65185e84c418fec1aae95633ff557efec6ea92c86df6142834f8bb047f332e24e79d5

      • memory/568-131-0x0000023760BEA000-0x0000023760BEF000-memory.dmp
        Filesize

        20KB

      • memory/568-133-0x00000237617E0000-0x00000237617E1000-memory.dmp
        Filesize

        4KB

      • memory/568-142-0x00000237617A0000-0x00000237617A6000-memory.dmp
        Filesize

        24KB

      • memory/568-120-0x0000023760FE0000-0x0000023760FE1000-memory.dmp
        Filesize

        4KB

      • memory/568-119-0x0000023760A80000-0x0000023760A81000-memory.dmp
        Filesize

        4KB

      • memory/568-139-0x0000023761A00000-0x0000023762518000-memory.dmp
        Filesize

        11.1MB

      • memory/568-118-0x0000023760BE6000-0x0000023760BE7000-memory.dmp
        Filesize

        4KB

      • memory/568-116-0x0000023760BE0000-0x0000023760BE2000-memory.dmp
        Filesize

        8KB

      • memory/568-117-0x0000023760BE3000-0x0000023760BE5000-memory.dmp
        Filesize

        8KB

      • memory/568-129-0x0000023760BB0000-0x0000023760BB1000-memory.dmp
        Filesize

        4KB

      • memory/568-130-0x0000023760BC0000-0x0000023760BD1000-memory.dmp
        Filesize

        68KB

      • memory/568-114-0x0000023748070000-0x000002374808F000-memory.dmp
        Filesize

        124KB

      • memory/568-132-0x0000023760BE8000-0x0000023760BEA000-memory.dmp
        Filesize

        8KB

      • memory/568-121-0x0000023760BE7000-0x0000023760BE8000-memory.dmp
        Filesize

        4KB

      • memory/568-134-0x0000023761830000-0x0000023761895000-memory.dmp
        Filesize

        404KB

      • memory/568-135-0x00000237617B0000-0x00000237617B1000-memory.dmp
        Filesize

        4KB

      • memory/568-136-0x0000023760FD0000-0x0000023760FD5000-memory.dmp
        Filesize

        20KB

      • memory/568-137-0x00000237618A0000-0x00000237618F9000-memory.dmp
        Filesize

        356KB

      • memory/568-138-0x0000023761900000-0x000002376198D000-memory.dmp
        Filesize

        564KB

      • memory/2976-141-0x0000000000000000-mapping.dmp
      • memory/2976-156-0x0000026702043000-0x0000026702045000-memory.dmp
        Filesize

        8KB

      • memory/2976-154-0x0000026702040000-0x0000026702042000-memory.dmp
        Filesize

        8KB

      • memory/2976-157-0x0000026702046000-0x0000026702048000-memory.dmp
        Filesize

        8KB

      • memory/2976-158-0x000002671B910000-0x000002671B911000-memory.dmp
        Filesize

        4KB

      • memory/2980-140-0x0000000000000000-mapping.dmp
      • memory/3528-122-0x0000000000000000-mapping.dmp
      • memory/4080-125-0x0000000000000000-mapping.dmp