Analysis

  • max time kernel
    150s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    24-10-2021 05:51

General

  • Target

    05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe

  • Size

    3.1MB

  • MD5

    9aad21656226a1e5faecd8845f6bf5f6

  • SHA1

    c842abda589d1a9e70b4201e92b84294e396604f

  • SHA256

    05d8a8bf79967e16aa9cf2901d0b51727c5f85414d94e9a1285145abf3398982

  • SHA512

    0f3443509607616649d6d804d17b53a8b7b05c82835958d9237660aa86881e28e43386d984b42776f53601f47dc639af0f15c3af47d0a7e47921ffbfa551605d

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pettbull.ddns.net:6606

pettbull.ddns.net:7707

pettbull.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Extracted

Family

quasar

Version

1.4.0

Botnet

PRO21

C2

pettbull.ddns.net:4782

Mutex

23e7ca58-8298-4c9f-b276-3466dcf2cfc0

Attributes
  • encryption_key

    DAE9E02E5E04D59D9AF2AA1D5E82248D5919AC6A

  • install_name

    Windows Update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Windows

  • subdirectory

    System32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Quasar Payload 5 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops startup file 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe
    "C:\Users\Admin\AppData\Local\Temp\05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\svchost.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:532
    • C:\Users\Admin\AppData\Roaming\Host.exe
      "C:\Users\Admin\AppData\Roaming\Host.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\Host.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
      • C:\Users\Admin\AppData\Roaming\Host.exe
        "C:\Users\Admin\AppData\Roaming\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1168
    • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
      "C:\Program Files (x86)\Adobe Inc.\Adobe Installer\Set-up.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      PID:308
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1924

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    ab5c36d10261c173c5896f3478cdc6b7

    SHA1

    87ac53810ad125663519e944bc87ded3979cbee4

    SHA256

    f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9

    SHA512

    e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d09ecc4bf8be6d53e94db3319318a553

    SHA1

    471e258f1760c45098887a2799f0389fa1a18464

    SHA256

    a5ee645f7345ae84aadc811d316f27f1019b3ca517d7647b6d6ee37efb40bc48

    SHA512

    d309b402c02d6fec995af61cce4f168cd35fea8482730ee336730420bd25bec8a046d9d1c7b4df44606cbab742bb4e7bb48eebe2eab82d84e39c26b0ede02a4f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    ee5906fa14532bfe9714efb9632b797a

    SHA1

    61d6f8856d7e9563994ae3de0966d54f917eb1f4

    SHA256

    fa16b9d4fd0e6510d9ea9993113bfa7ee503c55d105707e41dd1b251c07ccfb3

    SHA512

    26f5685be6b86a00eddae3da1dc75a9b5f16a94afb502c6dcf2a45b167e544d3b7877f4167efc1bca595be7667a1c7c7017fa449dfe83b115d5d3d6eff7f4f2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • \Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • \Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • \Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • \Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • memory/308-116-0x0000000000000000-mapping.dmp
  • memory/532-73-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/532-74-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/532-101-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB

  • memory/532-77-0x000000000040C73E-mapping.dmp
  • memory/532-76-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/532-75-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/532-72-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/532-80-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/568-95-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/568-93-0x0000000000660000-0x0000000000661000-memory.dmp
    Filesize

    4KB

  • memory/568-59-0x0000000000000000-mapping.dmp
  • memory/568-62-0x0000000000A60000-0x0000000000A61000-memory.dmp
    Filesize

    4KB

  • memory/568-71-0x0000000000260000-0x0000000000275000-memory.dmp
    Filesize

    84KB

  • memory/792-54-0x0000000075331000-0x0000000075333000-memory.dmp
    Filesize

    8KB

  • memory/1168-107-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1168-104-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1168-106-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1168-105-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1168-108-0x000000000047E7CE-mapping.dmp
  • memory/1168-110-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1168-122-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
    Filesize

    4KB

  • memory/1168-103-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1820-65-0x0000000000000000-mapping.dmp
  • memory/1820-67-0x0000000002250000-0x0000000002251000-memory.dmp
    Filesize

    4KB

  • memory/1820-69-0x0000000002252000-0x0000000002254000-memory.dmp
    Filesize

    8KB

  • memory/1820-68-0x0000000002251000-0x0000000002252000-memory.dmp
    Filesize

    4KB

  • memory/1924-70-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
    Filesize

    8KB

  • memory/1976-119-0x00000000041B0000-0x00000000041B1000-memory.dmp
    Filesize

    4KB

  • memory/1976-85-0x0000000000000000-mapping.dmp
  • memory/1976-121-0x0000000000340000-0x0000000000341000-memory.dmp
    Filesize

    4KB

  • memory/1976-88-0x0000000000350000-0x0000000000351000-memory.dmp
    Filesize

    4KB

  • memory/2024-91-0x0000000000000000-mapping.dmp
  • memory/2024-97-0x00000000022C0000-0x0000000002F0A000-memory.dmp
    Filesize

    12.3MB

  • memory/2024-98-0x00000000022C0000-0x0000000002F0A000-memory.dmp
    Filesize

    12.3MB

  • memory/2024-99-0x00000000022C0000-0x0000000002F0A000-memory.dmp
    Filesize

    12.3MB