Analysis

  • max time kernel
    102s
  • max time network
    99s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    24-10-2021 05:51

General

  • Target

    05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe

  • Size

    3.1MB

  • MD5

    9aad21656226a1e5faecd8845f6bf5f6

  • SHA1

    c842abda589d1a9e70b4201e92b84294e396604f

  • SHA256

    05d8a8bf79967e16aa9cf2901d0b51727c5f85414d94e9a1285145abf3398982

  • SHA512

    0f3443509607616649d6d804d17b53a8b7b05c82835958d9237660aa86881e28e43386d984b42776f53601f47dc639af0f15c3af47d0a7e47921ffbfa551605d

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pettbull.ddns.net:6606

pettbull.ddns.net:7707

pettbull.ddns.net:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Extracted

Family

quasar

Version

1.4.0

Botnet

PRO21

C2

pettbull.ddns.net:4782

Mutex

23e7ca58-8298-4c9f-b276-3466dcf2cfc0

Attributes
  • encryption_key

    DAE9E02E5E04D59D9AF2AA1D5E82248D5919AC6A

  • install_name

    Windows Update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Windows

  • subdirectory

    System32

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Quasar Payload 3 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops startup file 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe
    "C:\Users\Admin\AppData\Local\Temp\05D8A8BF79967E16AA9CF2901D0B51727C5F85414D94E9A1285145ABF3398982.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\svchost.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:636
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2636
    • C:\Users\Admin\AppData\Roaming\Host.exe
      "C:\Users\Admin\AppData\Roaming\Host.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell" copy-item 'C:\Users\Admin\AppData\Roaming\Host.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Roaming\Host.exe
        "C:\Users\Admin\AppData\Roaming\Host.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1928
    • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
      "C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      PID:3488
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2552

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • C:\Program Files (x86)\Adobe Inc\Adobe Installer\Set-up.exe
    MD5

    41f159509017d234e08eb4f820bab935

    SHA1

    1c27a70f922a95f66f58d8e4b7e91d92c84da6e3

    SHA256

    4460dd8114b5609ea4e9644a659de0f5b188696d27dc8846d633628b3ade7c31

    SHA512

    0fdbad1473708fbf1116638195881026caab40a5b64ab31ca25a027af81189bf94af403d5b1c35c5561970adaeef648b8ed5ef8c3ba63b163e931787e82636ab

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Host.exe.log
    MD5

    31f89a37dd1c6602132edf73d8fd1cb3

    SHA1

    8599db27f10e8b4201efbfebd42d3f3890a4b0b1

    SHA256

    32165692323f0947ef81fea90865ed18e79ab0ec185ace6647ce15731de3f40e

    SHA512

    09bce426d25500895ea274f054609cf6606deece3170911d0c875dd6ca0c3e61cebb02b32bda7ed07258a806f72e72c23d08a10ddcf36b1011742d4248362112

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PowerShell.exe.log
    MD5

    6bf0e5945fb9da68e1b03bdaed5f6f8d

    SHA1

    eed3802c8e4abe3b327c100c99c53d3bbcf8a33d

    SHA256

    dda58fd16fee83a65c05936b1a070187f2c360024650ecaf857c5e060a6a55f1

    SHA512

    977a393fdad2b162aa42194ddad6ec8bcab24f81980ff01b1c22c4d59ac268bb5ce947105c968de1a8a66b35023280a1e7709dfea5053385f87141389ebecb25

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log
    MD5

    31f89a37dd1c6602132edf73d8fd1cb3

    SHA1

    8599db27f10e8b4201efbfebd42d3f3890a4b0b1

    SHA256

    32165692323f0947ef81fea90865ed18e79ab0ec185ace6647ce15731de3f40e

    SHA512

    09bce426d25500895ea274f054609cf6606deece3170911d0c875dd6ca0c3e61cebb02b32bda7ed07258a806f72e72c23d08a10ddcf36b1011742d4248362112

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    9796dee16c27bc49f2ca75308b73353b

    SHA1

    4b12afadf59be39d63b65691cefb4fd4191994ff

    SHA256

    1024f79d9d83dc92386f8fb3fae47f4068b48235ccdf622e7cd88198ffa065f7

    SHA512

    6d98614009cbaef3577e263089e2046de4c2e847e1a779236257e0e7bcfc0468a7b7d969b899ff3af7a5b50724c63da52e9e1fade35cd88ec4505a0f74217cb3

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Host.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe
    MD5

    17348c1d08adf588f96565fed074ceb2

    SHA1

    e8836e8e3df1fa93d53428d497aef14b5c5ce058

    SHA256

    49299ae3361dc7868151abacda1a1250c0bb6cd48a1beea7262871b28a68c33c

    SHA512

    dc77dc6408a052ecc20806b5437da4c4243b135639226e1d37cb951456cf916111ec5da38802dfafe56e48d9a0f9c83f2d79e6d1ccb0b42618c3edb0ffd4967f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe
    MD5

    82d476c05f94eb8fad06b57f4899823e

    SHA1

    2739b763058cd8aae8efd0ff4e9cfa51b4c2c750

    SHA256

    abb9f1457f48fb9219e3b5b3360ec892828db320230b24e21b87cdbc9be99658

    SHA512

    9856a5b9bc6e0fa7562efd4de0ed0e0c11157ac4391d663fc15f13ebc1d2c9988a42c69c41ef1858697806f05a1f93754cf580213d14bb3b4e287fb08985b75f

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    MD5

    38039e921eb17d1806f8f87bc318ad99

    SHA1

    9d407a9625317a56f8b777c1da4dec9c2f7e4e34

    SHA256

    d27759d0225a1e39557bb7a460b9fdae16f6126adabbc06e4ab27ece6b84a437

    SHA512

    ece169f7cc92a2d42b460a7c8cc30d1979a3acbdd02278c02a2a79f72ec478ce89b1191a859fd21409e9d68d2e000178a7375f9305b74695c2a874062079bbd3

  • memory/636-132-0x00000000080E0000-0x00000000080E1000-memory.dmp
    Filesize

    4KB

  • memory/636-128-0x00000000071B2000-0x00000000071B3000-memory.dmp
    Filesize

    4KB

  • memory/636-122-0x0000000000000000-mapping.dmp
  • memory/636-133-0x0000000008490000-0x0000000008491000-memory.dmp
    Filesize

    4KB

  • memory/636-134-0x0000000008870000-0x0000000008871000-memory.dmp
    Filesize

    4KB

  • memory/636-135-0x00000000088C0000-0x00000000088C1000-memory.dmp
    Filesize

    4KB

  • memory/636-136-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
    Filesize

    4KB

  • memory/636-140-0x0000000009610000-0x0000000009611000-memory.dmp
    Filesize

    4KB

  • memory/636-141-0x0000000008BA0000-0x0000000008BA1000-memory.dmp
    Filesize

    4KB

  • memory/636-142-0x00000000095A0000-0x00000000095A1000-memory.dmp
    Filesize

    4KB

  • memory/636-144-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
    Filesize

    4KB

  • memory/636-145-0x00000000071B3000-0x00000000071B4000-memory.dmp
    Filesize

    4KB

  • memory/636-123-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
    Filesize

    4KB

  • memory/636-131-0x0000000007E90000-0x0000000007E91000-memory.dmp
    Filesize

    4KB

  • memory/636-124-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
    Filesize

    4KB

  • memory/636-130-0x0000000008070000-0x0000000008071000-memory.dmp
    Filesize

    4KB

  • memory/636-129-0x00000000077C0000-0x00000000077C1000-memory.dmp
    Filesize

    4KB

  • memory/636-125-0x00000000070E0000-0x00000000070E1000-memory.dmp
    Filesize

    4KB

  • memory/636-127-0x00000000071B0000-0x00000000071B1000-memory.dmp
    Filesize

    4KB

  • memory/636-126-0x00000000077F0000-0x00000000077F1000-memory.dmp
    Filesize

    4KB

  • memory/1368-207-0x0000000005030000-0x000000000552E000-memory.dmp
    Filesize

    5.0MB

  • memory/1368-156-0x00000000006A0000-0x00000000006A1000-memory.dmp
    Filesize

    4KB

  • memory/1368-153-0x0000000000000000-mapping.dmp
  • memory/1368-206-0x0000000005030000-0x000000000552E000-memory.dmp
    Filesize

    5.0MB

  • memory/1928-209-0x00000000050C0000-0x00000000050C1000-memory.dmp
    Filesize

    4KB

  • memory/1928-196-0x000000000047E7CE-mapping.dmp
  • memory/1928-204-0x00000000050F0000-0x00000000050F1000-memory.dmp
    Filesize

    4KB

  • memory/1928-211-0x0000000005630000-0x0000000005631000-memory.dmp
    Filesize

    4KB

  • memory/1928-195-0x0000000000400000-0x0000000000484000-memory.dmp
    Filesize

    528KB

  • memory/1928-208-0x00000000051E0000-0x00000000056DE000-memory.dmp
    Filesize

    5.0MB

  • memory/1928-210-0x00000000061F0000-0x00000000061F1000-memory.dmp
    Filesize

    4KB

  • memory/2428-169-0x0000000005120000-0x0000000005121000-memory.dmp
    Filesize

    4KB

  • memory/2428-187-0x0000000003570000-0x0000000003571000-memory.dmp
    Filesize

    4KB

  • memory/2428-188-0x0000000005123000-0x0000000005124000-memory.dmp
    Filesize

    4KB

  • memory/2428-178-0x0000000003570000-0x0000000003571000-memory.dmp
    Filesize

    4KB

  • memory/2428-170-0x0000000005122000-0x0000000005123000-memory.dmp
    Filesize

    4KB

  • memory/2428-163-0x0000000003570000-0x0000000003571000-memory.dmp
    Filesize

    4KB

  • memory/2428-162-0x0000000003570000-0x0000000003571000-memory.dmp
    Filesize

    4KB

  • memory/2428-160-0x0000000000000000-mapping.dmp
  • memory/2636-148-0x000000000040C73E-mapping.dmp
  • memory/2636-189-0x0000000005C01000-0x0000000005C02000-memory.dmp
    Filesize

    4KB

  • memory/2636-147-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/3488-200-0x0000000000000000-mapping.dmp
  • memory/3740-120-0x0000000005700000-0x0000000005701000-memory.dmp
    Filesize

    4KB

  • memory/3740-121-0x0000000005CA0000-0x0000000005CA1000-memory.dmp
    Filesize

    4KB

  • memory/3740-118-0x0000000000830000-0x0000000000831000-memory.dmp
    Filesize

    4KB

  • memory/3740-168-0x0000000005540000-0x00000000055DC000-memory.dmp
    Filesize

    624KB

  • memory/3740-167-0x00000000057A0000-0x0000000005C9E000-memory.dmp
    Filesize

    5.0MB

  • memory/3740-146-0x0000000005540000-0x0000000005555000-memory.dmp
    Filesize

    84KB

  • memory/3740-115-0x0000000000000000-mapping.dmp