Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-09-2021 22:02
Behavioral task
behavioral1
Sample
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe
Resource
win7-en-20210920
General
-
Target
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe
-
Size
48KB
-
MD5
852b69a95f1ae83d9142fced3450977b
-
SHA1
a48b15998be1e979530994675da17566d1769769
-
SHA256
3b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
-
SHA512
23b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9
Malware Config
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Gruop.exe asyncrat C:\Users\Admin\AppData\Roaming\Gruop.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Gruop.exepid process 580 Gruop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2244 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exepid process 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exeGruop.exedescription pid process Token: SeDebugPrivilege 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe Token: SeDebugPrivilege 580 Gruop.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.execmd.execmd.exedescription pid process target process PID 3728 wrote to memory of 752 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3728 wrote to memory of 752 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3728 wrote to memory of 752 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3728 wrote to memory of 424 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3728 wrote to memory of 424 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 3728 wrote to memory of 424 3728 3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe cmd.exe PID 752 wrote to memory of 60 752 cmd.exe schtasks.exe PID 752 wrote to memory of 60 752 cmd.exe schtasks.exe PID 752 wrote to memory of 60 752 cmd.exe schtasks.exe PID 424 wrote to memory of 2244 424 cmd.exe timeout.exe PID 424 wrote to memory of 2244 424 cmd.exe timeout.exe PID 424 wrote to memory of 2244 424 cmd.exe timeout.exe PID 424 wrote to memory of 580 424 cmd.exe Gruop.exe PID 424 wrote to memory of 580 424 cmd.exe Gruop.exe PID 424 wrote to memory of 580 424 cmd.exe Gruop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe"C:\Users\Admin\AppData\Local\Temp\3B599CC4DBEDAC85F9D2E5E4F1B96110F05835BBDFB0C.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Gruop" /tr '"C:\Users\Admin\AppData\Roaming\Gruop.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Gruop" /tr '"C:\Users\Admin\AppData\Roaming\Gruop.exe"'3⤵
- Creates scheduled task(s)
PID:60
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4272.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2244
-
-
C:\Users\Admin\AppData\Roaming\Gruop.exe"C:\Users\Admin\AppData\Roaming\Gruop.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f27130d2aafa37bed16d663a4d15f967
SHA11b648df4adc749084520239bccfa546daebb8020
SHA256f1eb6d3d27ee1f51b83a52eb9c83d2225aff1b1b6d66423645891bd903d206ce
SHA5123dc5d044f40dc95e7f3d6c73c5a5b4f233c63853f9c793dfcae7d056569984d9739f6d7453289f0e94eb33a9d962d8bb173292d752fd1a815fb2cec46596bd13
-
MD5
852b69a95f1ae83d9142fced3450977b
SHA1a48b15998be1e979530994675da17566d1769769
SHA2563b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
SHA51223b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9
-
MD5
852b69a95f1ae83d9142fced3450977b
SHA1a48b15998be1e979530994675da17566d1769769
SHA2563b599cc4dbedac85f9d2e5e4f1b96110f05835bbdfb0c01a84bdaaec79885a19
SHA51223b4602cbcd8abd3c78953e07301daaaaa5e7ff2ea1abba28cecfecd3e6522f0a31a97f7b537c98d2a3a00671b8c9b1d06d0b9e63f9e8359a9395081f1d2f8c9