Analysis

  • max time kernel
    138s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    08-11-2021 18:54

General

  • Target

    78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda.exe

  • Size

    1.2MB

  • MD5

    93f2ef7ece667948d903fd81a9c93dae

  • SHA1

    33a83a4a6d582c20c44719df67815455ec4f789c

  • SHA256

    78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda

  • SHA512

    793a9521600f50d127556ab7c46929faddc74e23cdbee49ec914a1502f346d7a3513036ee8d9c8d8c31112325217951b5e60df07093e5b6f3d0d3fc7148d2a4a

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 10 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda.exe
    "C:\Users\Admin\AppData\Local\Temp\78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rtcupdater" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "rtcupdater" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe"
        3⤵
        • Adds Run key to start application
        PID:1008
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1300
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
          • Enumerates connected drives
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1144
          • C:\Windows\system32\ctfmon.exe
            ctfmon.exe
            5⤵
              PID:1516
    • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1916
    • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
      "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
      1⤵
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:3276

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    3
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    4
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rtcupdater.exe.log
      MD5

      7648e852b0157b362b07766e0b5b355e

      SHA1

      6f9ac6e9d89842d38345fb83930d8c927cb44c69

      SHA256

      8dd14eb336757d783e47f36a98a4fe5c1314d93782907f538417265037819896

      SHA512

      849e5e18a2439b9a228395c5f92d1ff8111b84ca7e56f9c2ace3580d21ceee0f78f7e9836668970a401fcf2fa2d88ff9aa89935595f45302b6af88a4069138d2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe
      MD5

      93f2ef7ece667948d903fd81a9c93dae

      SHA1

      33a83a4a6d582c20c44719df67815455ec4f789c

      SHA256

      78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda

      SHA512

      793a9521600f50d127556ab7c46929faddc74e23cdbee49ec914a1502f346d7a3513036ee8d9c8d8c31112325217951b5e60df07093e5b6f3d0d3fc7148d2a4a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe
      MD5

      93f2ef7ece667948d903fd81a9c93dae

      SHA1

      33a83a4a6d582c20c44719df67815455ec4f789c

      SHA256

      78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda

      SHA512

      793a9521600f50d127556ab7c46929faddc74e23cdbee49ec914a1502f346d7a3513036ee8d9c8d8c31112325217951b5e60df07093e5b6f3d0d3fc7148d2a4a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Root\rtcupdater.exe
      MD5

      93f2ef7ece667948d903fd81a9c93dae

      SHA1

      33a83a4a6d582c20c44719df67815455ec4f789c

      SHA256

      78b4ba3aaf358440be7212cb23b8ca6c3f4fef477436b52c483185d4b90a8dda

      SHA512

      793a9521600f50d127556ab7c46929faddc74e23cdbee49ec914a1502f346d7a3513036ee8d9c8d8c31112325217951b5e60df07093e5b6f3d0d3fc7148d2a4a

    • memory/1008-125-0x0000000000000000-mapping.dmp
    • memory/1144-156-0x00000000037D0000-0x00000000037D1000-memory.dmp
      Filesize

      4KB

    • memory/1144-154-0x0000000000000000-mapping.dmp
    • memory/1184-124-0x0000000000000000-mapping.dmp
    • memory/1300-142-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1300-150-0x0000000005700000-0x0000000005701000-memory.dmp
      Filesize

      4KB

    • memory/1300-148-0x0000000003040000-0x000000000305E000-memory.dmp
      Filesize

      120KB

    • memory/1300-146-0x0000000002C30000-0x0000000002C50000-memory.dmp
      Filesize

      128KB

    • memory/1300-149-0x0000000000400000-0x0000000000437000-memory.dmp
      Filesize

      220KB

    • memory/1300-151-0x0000000005702000-0x0000000005703000-memory.dmp
      Filesize

      4KB

    • memory/1300-152-0x0000000005703000-0x0000000005704000-memory.dmp
      Filesize

      4KB

    • memory/1300-143-0x000000000040CD2F-mapping.dmp
    • memory/1516-155-0x0000000000000000-mapping.dmp
    • memory/2640-123-0x00000000067F0000-0x00000000067F1000-memory.dmp
      Filesize

      4KB

    • memory/2640-120-0x00000000055E0000-0x0000000005ADE000-memory.dmp
      Filesize

      5.0MB

    • memory/2640-117-0x0000000005AE0000-0x0000000005AE1000-memory.dmp
      Filesize

      4KB

    • memory/2640-118-0x00000000055E0000-0x00000000055E1000-memory.dmp
      Filesize

      4KB

    • memory/2640-119-0x0000000005720000-0x0000000005721000-memory.dmp
      Filesize

      4KB

    • memory/2640-121-0x0000000006790000-0x00000000067B1000-memory.dmp
      Filesize

      132KB

    • memory/2640-126-0x00000000055E0000-0x0000000005ADE000-memory.dmp
      Filesize

      5.0MB

    • memory/2640-115-0x0000000000B00000-0x0000000000B01000-memory.dmp
      Filesize

      4KB

    • memory/2640-122-0x0000000006830000-0x0000000006831000-memory.dmp
      Filesize

      4KB

    • memory/2832-127-0x0000000000000000-mapping.dmp
    • memory/2832-141-0x0000000009320000-0x0000000009321000-memory.dmp
      Filesize

      4KB

    • memory/2832-135-0x0000000004FE0000-0x00000000054DE000-memory.dmp
      Filesize

      5.0MB

    • memory/2832-139-0x0000000004FE0000-0x00000000054DE000-memory.dmp
      Filesize

      5.0MB

    • memory/2832-140-0x0000000006D40000-0x0000000006D4B000-memory.dmp
      Filesize

      44KB