Analysis

  • max time kernel
    122s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    20-10-2021 03:59

General

  • Target

    B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe

  • Size

    46.0MB

  • MD5

    0821c3d4dee7db77d2b4fe56f242143f

  • SHA1

    5238e22879987f3ed2d524eb147d1859f184957b

  • SHA256

    b3a5edd96f0e9d42da79564d4f9b8764cc52d07896a843f03fdc34c7cc23f338

  • SHA512

    567035148517e9feffe094e1bccb5a8d2561051249a81cb5cbc250440c5e42a079fb6dd896853794168e49cd1fead9e1067930367bd572dfc6f56a9ec7fb5ad6

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pettbull.ddns.net:6606

pettbull.ddns.net:7707

pettbull.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Extracted

Family

quasar

Version

1.4.0

Botnet

PRO21

C2

pettbull.ddns.net:4782

Mutex

23e7ca58-8298-4c9f-b276-3466dcf2cfc0

Attributes
  • encryption_key

    DAE9E02E5E04D59D9AF2AA1D5E82248D5919AC6A

  • install_name

    Windows Update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Windows

  • subdirectory

    System32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Quasar Payload 3 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops startup file 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe
    "C:\Users\Admin\AppData\Local\Temp\B3A5EDD96F0E9D42DA79564D4F9B8764CC52D07896A843F03FDC34C7CC23F338.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\svchost.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2736
    • C:\Users\Admin\AppData\Roaming\Host.exe
      "C:\Users\Admin\AppData\Roaming\Host.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\Host.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:424
      • C:\Users\Admin\AppData\Roaming\Host.exe
        "C:\Users\Admin\AppData\Roaming\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2352
    • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
      "C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\is-1VGUK.tmp\epm_setup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-1VGUK.tmp\epm_setup.tmp" /SL5="$401EC,46887390,159744,C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3848

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • C:\Program Files (x86)\EaseUS\EaseUS Partition Master Trial Edition\epm_setup.exe
    MD5

    2600cb19f2494e25c6e4bc928dd72d44

    SHA1

    909254fdb5bd7f5065fdf1b269c0afae7a0e9ea6

    SHA256

    a4d07928e3408fdc51b54f24b6aa47cd7fc6e47f16478d419512c136bf496b3e

    SHA512

    60f56a2eba22d21ae7b4dcd40804b38266cb383aed6ca4a71c324b6c0cbba9f854ce1ff6c677d3ff0294747b4cc1c18b9656a484e31cb528f1e5d0c4c5ea6e47

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Host.exe.log
    MD5

    31f89a37dd1c6602132edf73d8fd1cb3

    SHA1

    8599db27f10e8b4201efbfebd42d3f3890a4b0b1

    SHA256

    32165692323f0947ef81fea90865ed18e79ab0ec185ace6647ce15731de3f40e

    SHA512

    09bce426d25500895ea274f054609cf6606deece3170911d0c875dd6ca0c3e61cebb02b32bda7ed07258a806f72e72c23d08a10ddcf36b1011742d4248362112

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PowerShell.exe.log
    MD5

    6bf0e5945fb9da68e1b03bdaed5f6f8d

    SHA1

    eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

    SHA256

    dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

    SHA512

    977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
    MD5

    31f89a37dd1c6602132edf73d8fd1cb3

    SHA1

    8599db27f10e8b4201efbfebd42d3f3890a4b0b1

    SHA256

    32165692323f0947ef81fea90865ed18e79ab0ec185ace6647ce15731de3f40e

    SHA512

    09bce426d25500895ea274f054609cf6606deece3170911d0c875dd6ca0c3e61cebb02b32bda7ed07258a806f72e72c23d08a10ddcf36b1011742d4248362112

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    50fc4314e91439601c1acfddc4ee4880

    SHA1

    2a331594e2f89fff5d61dce97efca7b7a3b18be8

    SHA256

    4383552b896679cc26757c1d69f5fc2b913d6540a4f57a56f8a3fd8abba7a7fa

    SHA512

    4613afa55d5485c1707e0e5cbaf4bafcbbcf493dda653e95155bd76074f9b8b6f839d6d456045caeb1083301e30a646a7deb61021545c105298c6ddcddc75a6b

  • C:\Users\Admin\AppData\Local\Temp\is-1VGUK.tmp\epm_setup.tmp
    MD5

    5c89dfa61730475598227eb55d61346a

    SHA1

    ace61af8fbfb290e636871f4b8566dfa3d000e36

    SHA256

    c75e56e754bbcdd7b27aca038ce2b0628708381bf83262b184e9fecb7d0b1307

    SHA512

    be12398aa2d6b770c5fbeb99c8f9ee396a50f0e0539466af7e520885505c1bcf7f0ef75e0d297df20a6f9958cf76662b2930d70420d916974cd8644b6140409e

  • C:\Users\Admin\AppData\Local\Temp\is-1VGUK.tmp\epm_setup.tmp
    MD5

    5c89dfa61730475598227eb55d61346a

    SHA1

    ace61af8fbfb290e636871f4b8566dfa3d000e36

    SHA256

    c75e56e754bbcdd7b27aca038ce2b0628708381bf83262b184e9fecb7d0b1307

    SHA512

    be12398aa2d6b770c5fbeb99c8f9ee396a50f0e0539466af7e520885505c1bcf7f0ef75e0d297df20a6f9958cf76662b2930d70420d916974cd8644b6140409e

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Local\Temp\is-BR2KK.tmp\EuActiveOnline.dll
    MD5

    08832f527ddc56fdfddb06e5b936e8ba

    SHA1

    5fc51d2d5e1e1d9460e1926cad5a540233b08993

    SHA256

    602ea813c7aae972ce0643429a1bdcfa5a9807eac0188b11a54936a30f32edb6

    SHA512

    9f9c748288e8eda9bd18c07551cf34c4f34240ab4cc1c46fac6449798325c97d6b466b76c317477d2c8b76701cf194e201beb15e938057d888eb2487e0092762

  • memory/332-170-0x00000000015D0000-0x00000000015D1000-memory.dmp
    Filesize

    4KB

  • memory/332-146-0x0000000001540000-0x0000000001555000-memory.dmp
    Filesize

    84KB

  • memory/332-118-0x0000000000860000-0x0000000000861000-memory.dmp
    Filesize

    4KB

  • memory/332-120-0x0000000005640000-0x0000000005641000-memory.dmp
    Filesize

    4KB

  • memory/332-115-0x0000000000000000-mapping.dmp
  • memory/332-168-0x0000000006201000-0x0000000006202000-memory.dmp
    Filesize

    4KB

  • memory/332-121-0x0000000005D00000-0x0000000005D01000-memory.dmp
    Filesize

    4KB

  • memory/424-171-0x0000000006E40000-0x0000000006E41000-memory.dmp
    Filesize

    4KB

  • memory/424-163-0x0000000002FC0000-0x0000000002FC1000-memory.dmp
    Filesize

    4KB

  • memory/424-162-0x0000000002FC0000-0x0000000002FC1000-memory.dmp
    Filesize

    4KB

  • memory/424-173-0x0000000006E42000-0x0000000006E43000-memory.dmp
    Filesize

    4KB

  • memory/424-178-0x0000000002FC0000-0x0000000002FC1000-memory.dmp
    Filesize

    4KB

  • memory/424-160-0x0000000000000000-mapping.dmp
  • memory/424-187-0x0000000002FC0000-0x0000000002FC1000-memory.dmp
    Filesize

    4KB

  • memory/424-189-0x0000000006E44000-0x0000000006E46000-memory.dmp
    Filesize

    8KB

  • memory/424-188-0x0000000006E43000-0x0000000006E44000-memory.dmp
    Filesize

    4KB

  • memory/2216-133-0x00000000079A0000-0x00000000079A1000-memory.dmp
    Filesize

    4KB

  • memory/2216-125-0x00000000041A0000-0x00000000041A1000-memory.dmp
    Filesize

    4KB

  • memory/2216-122-0x0000000000000000-mapping.dmp
  • memory/2216-124-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/2216-123-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/2216-145-0x0000000006863000-0x0000000006864000-memory.dmp
    Filesize

    4KB

  • memory/2216-144-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/2216-142-0x00000000089E0000-0x00000000089E1000-memory.dmp
    Filesize

    4KB

  • memory/2216-141-0x0000000008990000-0x0000000008991000-memory.dmp
    Filesize

    4KB

  • memory/2216-140-0x0000000008A30000-0x0000000008A31000-memory.dmp
    Filesize

    4KB

  • memory/2216-136-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/2216-135-0x0000000007CC0000-0x0000000007CC1000-memory.dmp
    Filesize

    4KB

  • memory/2216-134-0x0000000007EA0000-0x0000000007EA1000-memory.dmp
    Filesize

    4KB

  • memory/2216-132-0x00000000075D0000-0x00000000075D1000-memory.dmp
    Filesize

    4KB

  • memory/2216-131-0x0000000006DE0000-0x0000000006DE1000-memory.dmp
    Filesize

    4KB

  • memory/2216-130-0x0000000006C90000-0x0000000006C91000-memory.dmp
    Filesize

    4KB

  • memory/2216-129-0x0000000006BF0000-0x0000000006BF1000-memory.dmp
    Filesize

    4KB

  • memory/2216-126-0x0000000006860000-0x0000000006861000-memory.dmp
    Filesize

    4KB

  • memory/2216-127-0x0000000006EA0000-0x0000000006EA1000-memory.dmp
    Filesize

    4KB

  • memory/2216-128-0x0000000006862000-0x0000000006863000-memory.dmp
    Filesize

    4KB

  • memory/2352-196-0x000000000047E7CE-mapping.dmp
  • memory/2352-195-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/2352-216-0x0000000004DD0000-0x00000000052CE000-memory.dmp
    Filesize

    5.0MB

  • memory/2352-203-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
    Filesize

    4KB

  • memory/2352-210-0x0000000004E40000-0x0000000004E41000-memory.dmp
    Filesize

    4KB

  • memory/2736-148-0x000000000040C73E-mapping.dmp
  • memory/2736-147-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/2736-190-0x0000000005801000-0x0000000005802000-memory.dmp
    Filesize

    4KB

  • memory/3172-151-0x0000000000000000-mapping.dmp
  • memory/3172-212-0x0000000005320000-0x000000000581E000-memory.dmp
    Filesize

    5.0MB

  • memory/3172-214-0x0000000005300000-0x0000000005301000-memory.dmp
    Filesize

    4KB

  • memory/3172-156-0x0000000000940000-0x0000000000941000-memory.dmp
    Filesize

    4KB

  • memory/3292-215-0x0000000000400000-0x0000000000431000-memory.dmp
    Filesize

    196KB

  • memory/3292-202-0x0000000000000000-mapping.dmp
  • memory/3848-208-0x0000000000000000-mapping.dmp
  • memory/3848-213-0x00000000006A0000-0x00000000006A1000-memory.dmp
    Filesize

    4KB