Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    12-09-2021 16:07

General

  • Target

    abdedf498be2483a583d52b054d3685e.exe

  • Size

    178KB

  • MD5

    abdedf498be2483a583d52b054d3685e

  • SHA1

    4cac54930e059ba7ad5fa65c24175f596fffe3f0

  • SHA256

    3f503cea0168fe927f9f93166c4d9677b39c7365c43dd0d1fafa1696889e2670

  • SHA512

    16a8bdccd9e2d597951dcdf123146cf17fc8472cdeca5ef911b9603ed020b378cefb209aa12b50e5ac0616d4a5e0beb805cde92ccb45c0309850d7ec577a0c02

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detect Neshta Payload 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abdedf498be2483a583d52b054d3685e.exe
    "C:\Users\Admin\AppData\Local\Temp\abdedf498be2483a583d52b054d3685e.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\3582-490\abdedf498be2483a583d52b054d3685e.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\abdedf498be2483a583d52b054d3685e.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "runhost" /tr '"C:\Users\Admin\source\runhost.exe"' & exit
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\System32\cmd.exe /c schtasks /create /f /sc onlogon /rl highest /tn runhost /tr '"C:\Users\Admin\source\runhost.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn runhost /tr '"C:\Users\Admin\source\runhost.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1000
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3811.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:460
        • C:\Users\Admin\source\runhost.exe
          "C:\Users\Admin\source\runhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\abdedf498be2483a583d52b054d3685e.exe

    MD5

    52de43c1b76a39500b9cf911ffc999a7

    SHA1

    e78f7c683a3a280e52b7ec78c3fc117209cfd2d0

    SHA256

    5f4be26ecb543fb8813a6acd9321277673bc50d057491cbdd8a2b1084928fb31

    SHA512

    60fc43b4d6a5297ccf5dc21352e29a0f2b9dbda3c4f935393affdbed028eb9042c18bda1b9bf01e7447b39713c799b02d583869043a6fedf65bca46847cc01e2

  • C:\Users\Admin\AppData\Local\Temp\3582-490\abdedf498be2483a583d52b054d3685e.exe

    MD5

    52de43c1b76a39500b9cf911ffc999a7

    SHA1

    e78f7c683a3a280e52b7ec78c3fc117209cfd2d0

    SHA256

    5f4be26ecb543fb8813a6acd9321277673bc50d057491cbdd8a2b1084928fb31

    SHA512

    60fc43b4d6a5297ccf5dc21352e29a0f2b9dbda3c4f935393affdbed028eb9042c18bda1b9bf01e7447b39713c799b02d583869043a6fedf65bca46847cc01e2

  • C:\Users\Admin\AppData\Local\Temp\tmp3811.tmp.bat

    MD5

    3972280773f552b16538e8e46fa4c3a3

    SHA1

    b207ba7be5ae0694734a94c8fc6e0f3ced6f2d31

    SHA256

    c7f369f87bb13196e27915bd449b1333a3fe725d507d1065c6b2fa0b38276b1e

    SHA512

    ba48f9ca2b0dabd7e83262446f0e6e6cfd639b1f1e86f5fb127c42239cd8027cefae2cdb4d6c154b42be175c135d47d357991fb9de293dc50900ecc540497d6a

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    MD5

    7cfdca6f21c5408fd6f77b983379b856

    SHA1

    6965a5ae89360591851c6d364b8d936f5304b5e1

    SHA256

    750e5c7275c39983c6e91f29cdba1ad12ed4e58d4ec509c65d67411129bd023b

    SHA512

    4d0917a73dd58b728cd134d667fb4bf3304be746c4799828f1b7161081a7e1ed08d4f92b88e743464f1da6c9ae35dd96ad233c0f039145fd0067dee5ee813c7c

  • C:\Users\Admin\source\runhost.exe

    MD5

    52de43c1b76a39500b9cf911ffc999a7

    SHA1

    e78f7c683a3a280e52b7ec78c3fc117209cfd2d0

    SHA256

    5f4be26ecb543fb8813a6acd9321277673bc50d057491cbdd8a2b1084928fb31

    SHA512

    60fc43b4d6a5297ccf5dc21352e29a0f2b9dbda3c4f935393affdbed028eb9042c18bda1b9bf01e7447b39713c799b02d583869043a6fedf65bca46847cc01e2

  • C:\Users\Admin\source\runhost.exe

    MD5

    52de43c1b76a39500b9cf911ffc999a7

    SHA1

    e78f7c683a3a280e52b7ec78c3fc117209cfd2d0

    SHA256

    5f4be26ecb543fb8813a6acd9321277673bc50d057491cbdd8a2b1084928fb31

    SHA512

    60fc43b4d6a5297ccf5dc21352e29a0f2b9dbda3c4f935393affdbed028eb9042c18bda1b9bf01e7447b39713c799b02d583869043a6fedf65bca46847cc01e2

  • C:\Windows\svchost.com

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • C:\Windows\svchost.com

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Google\Temp\GUMB4FC.tmp\GOFB2B~1.EXE

    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE

    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \Users\Admin\AppData\Local\Temp\3582-490\abdedf498be2483a583d52b054d3685e.exe

    MD5

    52de43c1b76a39500b9cf911ffc999a7

    SHA1

    e78f7c683a3a280e52b7ec78c3fc117209cfd2d0

    SHA256

    5f4be26ecb543fb8813a6acd9321277673bc50d057491cbdd8a2b1084928fb31

    SHA512

    60fc43b4d6a5297ccf5dc21352e29a0f2b9dbda3c4f935393affdbed028eb9042c18bda1b9bf01e7447b39713c799b02d583869043a6fedf65bca46847cc01e2

  • memory/452-64-0x0000000000000000-mapping.dmp

  • memory/460-71-0x0000000000000000-mapping.dmp

  • memory/940-67-0x0000000000000000-mapping.dmp

  • memory/1000-72-0x0000000000000000-mapping.dmp

  • memory/1664-52-0x0000000075231000-0x0000000075233000-memory.dmp

    Filesize

    8KB

  • memory/1684-68-0x0000000000000000-mapping.dmp

  • memory/1764-73-0x0000000000000000-mapping.dmp

  • memory/1764-76-0x00000000009D0000-0x00000000009D1000-memory.dmp

    Filesize

    4KB

  • memory/1764-78-0x000000001AAD0000-0x000000001AAD2000-memory.dmp

    Filesize

    8KB

  • memory/1764-79-0x000000001AAD6000-0x000000001AAF5000-memory.dmp

    Filesize

    124KB

  • memory/1916-59-0x0000000000910000-0x0000000000912000-memory.dmp

    Filesize

    8KB

  • memory/1916-57-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

    Filesize

    4KB

  • memory/1916-54-0x0000000000000000-mapping.dmp