Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 21:42
Behavioral task
behavioral1
Sample
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe
Resource
win7-en-20210920
General
-
Target
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe
-
Size
48KB
-
MD5
852b69a95f1ae83d9142fced3450977b
-
SHA1
a48b15998be1e979530994675da17566d1769769
-
SHA256
3b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
-
SHA512
23b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9
Malware Config
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Gruop.exe asyncrat C:\Users\Admin\AppData\Roaming\Gruop.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Gruop.exepid process 420 Gruop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1892 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exepid process 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exeGruop.exedescription pid process Token: SeDebugPrivilege 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe Token: SeDebugPrivilege 420 Gruop.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.execmd.execmd.exedescription pid process target process PID 3628 wrote to memory of 2220 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3628 wrote to memory of 2220 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3628 wrote to memory of 2220 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3628 wrote to memory of 1008 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3628 wrote to memory of 1008 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3628 wrote to memory of 1008 3628 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 2220 wrote to memory of 764 2220 cmd.exe schtasks.exe PID 2220 wrote to memory of 764 2220 cmd.exe schtasks.exe PID 2220 wrote to memory of 764 2220 cmd.exe schtasks.exe PID 1008 wrote to memory of 1892 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 1892 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 1892 1008 cmd.exe timeout.exe PID 1008 wrote to memory of 420 1008 cmd.exe Gruop.exe PID 1008 wrote to memory of 420 1008 cmd.exe Gruop.exe PID 1008 wrote to memory of 420 1008 cmd.exe Gruop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe"C:\Users\Admin\AppData\Local\Temp\3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Gruop" /tr '"C:\Users\Admin\AppData\Roaming\Gruop.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Gruop" /tr '"C:\Users\Admin\AppData\Roaming\Gruop.exe"'3⤵
- Creates scheduled task(s)
PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3478.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1892
-
-
C:\Users\Admin\AppData\Roaming\Gruop.exe"C:\Users\Admin\AppData\Roaming\Gruop.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
89affcc73a9e72c91b3a1a79afe5c189
SHA1842a6f0f182b55d703338d3423ae74beaf45ef08
SHA256a45bc2600f879955b4f2690ed9b132da00abbdff7f8f244701ab5516590371ca
SHA51240649bb3c2f29477a7ecbdbbe8f681691cdc4f5acf47c1ab25fd0393c744293e402f2e2704b160a0f11a825a34803bf16433f3a8101f3ef6ff9b2f64bf992483
-
MD5
852b69a95f1ae83d9142fced3450977b
SHA1a48b15998be1e979530994675da17566d1769769
SHA2563b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
SHA51223b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9
-
MD5
852b69a95f1ae83d9142fced3450977b
SHA1a48b15998be1e979530994675da17566d1769769
SHA2563b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
SHA51223b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9