Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    06-12-2021 11:19

General

  • Target

    9731acc2acbf8329ae69f9d7d50e1998.exe

  • Size

    484KB

  • MD5

    9731acc2acbf8329ae69f9d7d50e1998

  • SHA1

    9d99415d1675f423ebd82551ba1aee7acdccab58

  • SHA256

    11dba92af0462cb18ac9c9ed81f104530819287f32be261915b706f83f6e04ad

  • SHA512

    03bb2f6731916fb4d3e75edb4b6ec34479b5f76b32028900105e63a58a8be6e9c5a5952e79f73f2c05687c31baa25b5e09ff86614986b6da9f31f47546cc86ae

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

3

C2

217.64.149.93:1973

Mutex

df4Rtg34dFt5ynrew

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    false

  • install_folder

    %AppData%

  • pastebin_config

    null

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • BitRAT Payload 7 IoCs
  • Async RAT payload 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9731acc2acbf8329ae69f9d7d50e1998.exe
    "C:\Users\Admin\AppData\Local\Temp\9731acc2acbf8329ae69f9d7d50e1998.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.yahoo.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1696
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1552
    • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
      C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:840
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe
            "C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1052
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.yahoo.com
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1520
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:304
            • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
              C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
              6⤵
              • Executes dropped EXE
              PID:1580
            • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
              C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetWindowsHookEx
              PID:1660

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe
    MD5

    9ca55d38876ba606e1d322eddb97eb3a

    SHA1

    0c0575292703ca0b07e512c3b6613e4e776e7d11

    SHA256

    5e949d278af13122d7dcf70722f612f2772ca6781a50f529da23db220d80fe0f

    SHA512

    c71c60df7e106daf578b9a43826acaa62dccbba866043d511ce5ce8c85d99483c82ef001bc5f2100aba3080af444bedfb3729c65a37e1025eb6ce91cc1be0b03

  • C:\Users\Admin\AppData\Local\Temp\ngwmdf.exe
    MD5

    9ca55d38876ba606e1d322eddb97eb3a

    SHA1

    0c0575292703ca0b07e512c3b6613e4e776e7d11

    SHA256

    5e949d278af13122d7dcf70722f612f2772ca6781a50f529da23db220d80fe0f

    SHA512

    c71c60df7e106daf578b9a43826acaa62dccbba866043d511ce5ce8c85d99483c82ef001bc5f2100aba3080af444bedfb3729c65a37e1025eb6ce91cc1be0b03

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    a4a5e44b11714c0f208886537fc0f0da

    SHA1

    12b6efda345b28ec67e3cb684a85a958f905da49

    SHA256

    2b59132a8f5d45239e9eaa7167f484f31bbd049e808ff63b7476c6cc9b05c70e

    SHA512

    93da5ecbfc3077aab6d8d97dcf7a3dbaab07cbfffcce04ae51ada51f7782b243c9b9af4de73f5c9a621da96377ba2f85094ab2a96e723bfc73f29c141124a8b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    a4a5e44b11714c0f208886537fc0f0da

    SHA1

    12b6efda345b28ec67e3cb684a85a958f905da49

    SHA256

    2b59132a8f5d45239e9eaa7167f484f31bbd049e808ff63b7476c6cc9b05c70e

    SHA512

    93da5ecbfc3077aab6d8d97dcf7a3dbaab07cbfffcce04ae51ada51f7782b243c9b9af4de73f5c9a621da96377ba2f85094ab2a96e723bfc73f29c141124a8b6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    3646683715086dd371714576dd2aba1b

    SHA1

    943dc8aaa247a96240cf6e4d8684a5041434fd3c

    SHA256

    68e4f615f0c7aa93af79e4dad31db129b62aa0ce667c5d315af3a148d83380b2

    SHA512

    7d7f9b981246e7dfc9024d1f5eba98fe4fb31c7ad91b0bb6a554a4ee30faabcfbcb4a5896124cd69de4a7a15e8eb542fb1bcd1aca0b5beec621585924b177f51

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    3646683715086dd371714576dd2aba1b

    SHA1

    943dc8aaa247a96240cf6e4d8684a5041434fd3c

    SHA256

    68e4f615f0c7aa93af79e4dad31db129b62aa0ce667c5d315af3a148d83380b2

    SHA512

    7d7f9b981246e7dfc9024d1f5eba98fe4fb31c7ad91b0bb6a554a4ee30faabcfbcb4a5896124cd69de4a7a15e8eb542fb1bcd1aca0b5beec621585924b177f51

  • \Users\Admin\AppData\Local\Temp\InstallUtil.exe
    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • \Users\Admin\AppData\Local\Temp\InstallUtil.exe
    MD5

    91c9ae9c9a17a9db5e08b120e668c74c

    SHA1

    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

    SHA256

    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

    SHA512

    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

  • \Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\AppData\Local\Temp\RegAsm.exe
    MD5

    b58b926c3574d28d5b7fdd2ca3ec30d5

    SHA1

    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

    SHA256

    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

    SHA512

    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

  • \Users\Admin\AppData\Local\Temp\ngwmdf.exe
    MD5

    9ca55d38876ba606e1d322eddb97eb3a

    SHA1

    0c0575292703ca0b07e512c3b6613e4e776e7d11

    SHA256

    5e949d278af13122d7dcf70722f612f2772ca6781a50f529da23db220d80fe0f

    SHA512

    c71c60df7e106daf578b9a43826acaa62dccbba866043d511ce5ce8c85d99483c82ef001bc5f2100aba3080af444bedfb3729c65a37e1025eb6ce91cc1be0b03

  • memory/304-104-0x0000000000000000-mapping.dmp
  • memory/304-107-0x00000000024B0000-0x00000000024B1000-memory.dmp
    Filesize

    4KB

  • memory/304-109-0x00000000024B2000-0x00000000024B4000-memory.dmp
    Filesize

    8KB

  • memory/304-108-0x00000000024B1000-0x00000000024B2000-memory.dmp
    Filesize

    4KB

  • memory/524-69-0x00000000047F0000-0x0000000004804000-memory.dmp
    Filesize

    80KB

  • memory/524-55-0x0000000000A40000-0x0000000000A41000-memory.dmp
    Filesize

    4KB

  • memory/524-68-0x0000000005210000-0x0000000005279000-memory.dmp
    Filesize

    420KB

  • memory/524-58-0x0000000004940000-0x0000000004941000-memory.dmp
    Filesize

    4KB

  • memory/524-57-0x0000000075461000-0x0000000075463000-memory.dmp
    Filesize

    8KB

  • memory/596-74-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/596-84-0x0000000000850000-0x000000000086B000-memory.dmp
    Filesize

    108KB

  • memory/596-83-0x0000000004F70000-0x0000000004F71000-memory.dmp
    Filesize

    4KB

  • memory/596-81-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/596-76-0x000000000040C6BE-mapping.dmp
  • memory/596-75-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/596-72-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/596-73-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/596-71-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/840-85-0x0000000000000000-mapping.dmp
  • memory/1052-92-0x0000000000000000-mapping.dmp
  • memory/1052-111-0x0000000006F90000-0x0000000007168000-memory.dmp
    Filesize

    1.8MB

  • memory/1052-110-0x0000000006BA0000-0x0000000006DC7000-memory.dmp
    Filesize

    2.2MB

  • memory/1052-94-0x0000000000020000-0x0000000000021000-memory.dmp
    Filesize

    4KB

  • memory/1052-97-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
    Filesize

    4KB

  • memory/1520-103-0x00000000023D2000-0x00000000023D4000-memory.dmp
    Filesize

    8KB

  • memory/1520-101-0x00000000023D0000-0x00000000023D1000-memory.dmp
    Filesize

    4KB

  • memory/1520-98-0x0000000000000000-mapping.dmp
  • memory/1520-102-0x00000000023D1000-0x00000000023D2000-memory.dmp
    Filesize

    4KB

  • memory/1552-67-0x0000000002410000-0x000000000305A000-memory.dmp
    Filesize

    12.3MB

  • memory/1552-64-0x0000000000000000-mapping.dmp
  • memory/1660-123-0x000000000068A488-mapping.dmp
  • memory/1660-121-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-125-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-122-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-115-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-116-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-117-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-119-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-120-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1660-118-0x0000000000400000-0x00000000007CE000-memory.dmp
    Filesize

    3.8MB

  • memory/1696-63-0x00000000022B2000-0x00000000022B4000-memory.dmp
    Filesize

    8KB

  • memory/1696-61-0x00000000022B0000-0x00000000022B1000-memory.dmp
    Filesize

    4KB

  • memory/1696-62-0x00000000022B1000-0x00000000022B2000-memory.dmp
    Filesize

    4KB

  • memory/1696-59-0x0000000000000000-mapping.dmp
  • memory/1728-86-0x0000000000000000-mapping.dmp
  • memory/1728-90-0x00000000024B0000-0x00000000030FA000-memory.dmp
    Filesize

    12.3MB