Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
e136f191f0f60e3468e4d2544593790b.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
e136f191f0f60e3468e4d2544593790b.exe
Resource
win10-en
General
-
Target
e136f191f0f60e3468e4d2544593790b.exe
-
Size
586KB
-
MD5
e136f191f0f60e3468e4d2544593790b
-
SHA1
4c9f0804d19fd54de4c8ad8d0c4d8b9f60563d8c
-
SHA256
88b664a4ced04195d83f1964093c0a689fc174522ad9e8f8443d70a7f22cc757
-
SHA512
d348b6c23bc4f56b4632875b199bedae025df2f71012e4d3a2a7d26d75b762df840d6daf0c13ba7d843caf4417e669a87930c3fabb01bead4e2e100eb3348874
Malware Config
Extracted
asyncrat
0.5.7B
WIRE$$$$$$$$
severdops.ddns.net:6204
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
true
-
install_file
iconfx.exe
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3964-122-0x000000000040C6FE-mapping.dmp asyncrat behavioral2/memory/3964-121-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/1852-143-0x000000000040C6FE-mapping.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
iconfx.exeiconfx.exepid process 1296 iconfx.exe 1852 iconfx.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e136f191f0f60e3468e4d2544593790b.exeiconfx.exedescription pid process target process PID 2700 set thread context of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 1296 set thread context of 1852 1296 iconfx.exe iconfx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2780 2700 WerFault.exe e136f191f0f60e3468e4d2544593790b.exe 2184 1296 WerFault.exe iconfx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1120 timeout.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
WerFault.exee136f191f0f60e3468e4d2544593790b.exeWerFault.exepid process 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 3964 e136f191f0f60e3468e4d2544593790b.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
e136f191f0f60e3468e4d2544593790b.exeWerFault.exee136f191f0f60e3468e4d2544593790b.exeiconfx.exeWerFault.exeiconfx.exedescription pid process Token: SeDebugPrivilege 2700 e136f191f0f60e3468e4d2544593790b.exe Token: SeRestorePrivilege 2780 WerFault.exe Token: SeBackupPrivilege 2780 WerFault.exe Token: SeDebugPrivilege 2780 WerFault.exe Token: SeDebugPrivilege 3964 e136f191f0f60e3468e4d2544593790b.exe Token: SeDebugPrivilege 1296 iconfx.exe Token: SeDebugPrivilege 2184 WerFault.exe Token: SeDebugPrivilege 1852 iconfx.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
e136f191f0f60e3468e4d2544593790b.exee136f191f0f60e3468e4d2544593790b.execmd.execmd.exeiconfx.exedescription pid process target process PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 2700 wrote to memory of 3964 2700 e136f191f0f60e3468e4d2544593790b.exe e136f191f0f60e3468e4d2544593790b.exe PID 3964 wrote to memory of 644 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 3964 wrote to memory of 644 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 3964 wrote to memory of 644 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 3964 wrote to memory of 2568 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 3964 wrote to memory of 2568 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 3964 wrote to memory of 2568 3964 e136f191f0f60e3468e4d2544593790b.exe cmd.exe PID 644 wrote to memory of 948 644 cmd.exe schtasks.exe PID 644 wrote to memory of 948 644 cmd.exe schtasks.exe PID 644 wrote to memory of 948 644 cmd.exe schtasks.exe PID 2568 wrote to memory of 1120 2568 cmd.exe timeout.exe PID 2568 wrote to memory of 1120 2568 cmd.exe timeout.exe PID 2568 wrote to memory of 1120 2568 cmd.exe timeout.exe PID 2568 wrote to memory of 1296 2568 cmd.exe iconfx.exe PID 2568 wrote to memory of 1296 2568 cmd.exe iconfx.exe PID 2568 wrote to memory of 1296 2568 cmd.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe PID 1296 wrote to memory of 1852 1296 iconfx.exe iconfx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e136f191f0f60e3468e4d2544593790b.exe"C:\Users\Admin\AppData\Local\Temp\e136f191f0f60e3468e4d2544593790b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e136f191f0f60e3468e4d2544593790b.exe"C:\Users\Admin\AppData\Local\Temp\e136f191f0f60e3468e4d2544593790b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "iconfx" /tr '"C:\Users\Admin\AppData\Roaming\iconfx.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "iconfx" /tr '"C:\Users\Admin\AppData\Roaming\iconfx.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6C6B.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\iconfx.exe"C:\Users\Admin\AppData\Roaming\iconfx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\iconfx.exe"C:\Users\Admin\AppData\Roaming\iconfx.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 11165⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 10842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp6C6B.tmp.batMD5
113b7bb336af71a200a54192308bf7ce
SHA1046345d4d9b2eec57ab38dfaeac8467e07fa10ff
SHA2564b02e18428750e208357d8d84214bf43692a18409a67ba13ccdd3b11be3a7ca5
SHA5124c091fc7cba5d0b7beb870d8cb92dbc0857ecea7af7259218b14aacc505697089bab34a60f102add791dc2718cd7c125759e2f7eee7c2feb45c4c9c00a544205
-
C:\Users\Admin\AppData\Roaming\iconfx.exeMD5
e136f191f0f60e3468e4d2544593790b
SHA14c9f0804d19fd54de4c8ad8d0c4d8b9f60563d8c
SHA25688b664a4ced04195d83f1964093c0a689fc174522ad9e8f8443d70a7f22cc757
SHA512d348b6c23bc4f56b4632875b199bedae025df2f71012e4d3a2a7d26d75b762df840d6daf0c13ba7d843caf4417e669a87930c3fabb01bead4e2e100eb3348874
-
C:\Users\Admin\AppData\Roaming\iconfx.exeMD5
e136f191f0f60e3468e4d2544593790b
SHA14c9f0804d19fd54de4c8ad8d0c4d8b9f60563d8c
SHA25688b664a4ced04195d83f1964093c0a689fc174522ad9e8f8443d70a7f22cc757
SHA512d348b6c23bc4f56b4632875b199bedae025df2f71012e4d3a2a7d26d75b762df840d6daf0c13ba7d843caf4417e669a87930c3fabb01bead4e2e100eb3348874
-
C:\Users\Admin\AppData\Roaming\iconfx.exeMD5
e136f191f0f60e3468e4d2544593790b
SHA14c9f0804d19fd54de4c8ad8d0c4d8b9f60563d8c
SHA25688b664a4ced04195d83f1964093c0a689fc174522ad9e8f8443d70a7f22cc757
SHA512d348b6c23bc4f56b4632875b199bedae025df2f71012e4d3a2a7d26d75b762df840d6daf0c13ba7d843caf4417e669a87930c3fabb01bead4e2e100eb3348874
-
memory/644-128-0x0000000000000000-mapping.dmp
-
memory/948-131-0x0000000000000000-mapping.dmp
-
memory/1120-132-0x0000000000000000-mapping.dmp
-
memory/1296-139-0x00000000057D0000-0x0000000005862000-memory.dmpFilesize
584KB
-
memory/1296-133-0x0000000000000000-mapping.dmp
-
memory/1852-148-0x0000000002FB0000-0x0000000002FB1000-memory.dmpFilesize
4KB
-
memory/1852-143-0x000000000040C6FE-mapping.dmp
-
memory/2568-129-0x0000000000000000-mapping.dmp
-
memory/2700-120-0x0000000004C40000-0x0000000004C51000-memory.dmpFilesize
68KB
-
memory/2700-123-0x0000000004D10000-0x0000000004D13000-memory.dmpFilesize
12KB
-
memory/2700-115-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2700-119-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/2700-118-0x0000000004CA0000-0x000000000519E000-memory.dmpFilesize
5.0MB
-
memory/2700-117-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/2700-116-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/3964-126-0x0000000001590000-0x0000000001591000-memory.dmpFilesize
4KB
-
memory/3964-125-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/3964-121-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3964-122-0x000000000040C6FE-mapping.dmp