Analysis
-
max time kernel
110s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
23-10-2021 06:32
Static task
static1
Behavioral task
behavioral1
Sample
SKM20212210RFQ00100490100.exe
Resource
win7-en-20210920
General
-
Target
SKM20212210RFQ00100490100.exe
-
Size
714KB
-
MD5
937c3eeb4afc46f15972f8631f098fec
-
SHA1
b4f162eaca7ea8cca9f0e637ea81a4eb349fef1e
-
SHA256
b1b14fd02510b79ea7f4a9a767d3738fc9761ce0b5d8b0ca969912d7942e8a94
-
SHA512
07c0802c6a6e96b3a001ef5144f80260c1d17e8197fca77baadb52c1f3ec62e88d95ab72ba15a2edc70482c0df5c7f8985130ba64c3d98ec778f475da7bf3f63
Malware Config
Extracted
asyncrat
0.5.7B
Default
cigdem5.duckdns.org:6606
cigdem5.duckdns.org:7707
cigdem5.duckdns.org:8808
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3068-125-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/3068-126-0x000000000040C73E-mapping.dmp asyncrat behavioral2/memory/3068-134-0x0000000006B20000-0x0000000006B3B000-memory.dmp asyncrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
SKM20212210RFQ00100490100.exepid process 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SKM20212210RFQ00100490100.exedescription pid process target process PID 3044 set thread context of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8 3044 WerFault.exe SKM20212210RFQ00100490100.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
SKM20212210RFQ00100490100.exeWerFault.exeSKM20212210RFQ00100490100.exepid process 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 3044 SKM20212210RFQ00100490100.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 3068 SKM20212210RFQ00100490100.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
SKM20212210RFQ00100490100.exeWerFault.exeSKM20212210RFQ00100490100.exedescription pid process Token: SeDebugPrivilege 3044 SKM20212210RFQ00100490100.exe Token: SeRestorePrivilege 8 WerFault.exe Token: SeBackupPrivilege 8 WerFault.exe Token: SeDebugPrivilege 8 WerFault.exe Token: SeDebugPrivilege 3068 SKM20212210RFQ00100490100.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
SKM20212210RFQ00100490100.exeSKM20212210RFQ00100490100.execmd.exedescription pid process target process PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3044 wrote to memory of 3068 3044 SKM20212210RFQ00100490100.exe SKM20212210RFQ00100490100.exe PID 3068 wrote to memory of 1360 3068 SKM20212210RFQ00100490100.exe cmd.exe PID 3068 wrote to memory of 1360 3068 SKM20212210RFQ00100490100.exe cmd.exe PID 3068 wrote to memory of 1360 3068 SKM20212210RFQ00100490100.exe cmd.exe PID 1360 wrote to memory of 2304 1360 cmd.exe powershell.exe PID 1360 wrote to memory of 2304 1360 cmd.exe powershell.exe PID 1360 wrote to memory of 2304 1360 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKM20212210RFQ00100490100.exe"C:\Users\Admin\AppData\Local\Temp\SKM20212210RFQ00100490100.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SKM20212210RFQ00100490100.exe"C:\Users\Admin\AppData\Local\Temp\SKM20212210RFQ00100490100.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\latyqf.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\latyqf.exe"'4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 17922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1360-136-0x0000000000000000-mapping.dmp
-
memory/2304-137-0x0000000000000000-mapping.dmp
-
memory/3044-117-0x00000000015C0000-0x00000000015C1000-memory.dmpFilesize
4KB
-
memory/3044-118-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/3044-119-0x00000000015B0000-0x00000000015B3000-memory.dmpFilesize
12KB
-
memory/3044-123-0x0000000006060000-0x0000000006082000-memory.dmpFilesize
136KB
-
memory/3044-124-0x0000000006600000-0x0000000006601000-memory.dmpFilesize
4KB
-
memory/3044-115-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/3068-125-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3068-132-0x0000000005D60000-0x0000000005D61000-memory.dmpFilesize
4KB
-
memory/3068-133-0x0000000006BA0000-0x0000000006BA1000-memory.dmpFilesize
4KB
-
memory/3068-134-0x0000000006B20000-0x0000000006B3B000-memory.dmpFilesize
108KB
-
memory/3068-135-0x0000000006C20000-0x0000000006C21000-memory.dmpFilesize
4KB
-
memory/3068-129-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/3068-126-0x000000000040C73E-mapping.dmp