Analysis
-
max time kernel
117s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-01-2022 21:27
Static task
static1
Behavioral task
behavioral1
Sample
4f689ad2542e385c696d18df256e474e.exe
Resource
win7-en-20211208
General
-
Target
4f689ad2542e385c696d18df256e474e.exe
-
Size
834KB
-
MD5
4f689ad2542e385c696d18df256e474e
-
SHA1
719a2ff49e7f8d5ac4a7b0f7dc2256f8ed45a541
-
SHA256
e7e4f472ffb41d0c2678ceac5a5c236242d46a6c781cf8431b661a3493a05eae
-
SHA512
ae60db8a63c035b2ff322f705b05ce358cac980b4bae750f4a29b8bdee52d89a7bf8c84024add4aa4c65ef0cc71e5b03081b69095599648b430bfb8f1299fb35
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.230.72.132:6606
5.230.72.132:7707
5.230.72.132:8808
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/956-62-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat behavioral1/memory/956-64-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat behavioral1/memory/956-63-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat behavioral1/memory/956-65-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f689ad2542e385c696d18df256e474e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f689ad2542e385c696d18df256e474e.exe -
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 4f689ad2542e385c696d18df256e474e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 4f689ad2542e385c696d18df256e474e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe = "0" 4f689ad2542e385c696d18df256e474e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe = "0" 4f689ad2542e385c696d18df256e474e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\CCECFEFFFBDEFFECBBCBEBB = "C:\\Windows\\Resources\\Themes\\BFEAAAFFBCDBFAFDEFADAACAAD\\svchost.exe" 4f689ad2542e385c696d18df256e474e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CCECFEFFFBDEFFECBBCBEBB = "C:\\Windows\\Resources\\Themes\\BFEAAAFFBCDBFAFDEFADAACAAD\\svchost.exe" 4f689ad2542e385c696d18df256e474e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4f689ad2542e385c696d18df256e474e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4f689ad2542e385c696d18df256e474e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription pid process target process PID 1068 set thread context of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe -
Drops file in Windows directory 2 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process File created C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe 4f689ad2542e385c696d18df256e474e.exe File opened for modification C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD 4f689ad2542e385c696d18df256e474e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exepowershell.exepowershell.exepid process 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1868 powershell.exe 1800 powershell.exe 1068 4f689ad2542e385c696d18df256e474e.exe 1068 4f689ad2542e385c696d18df256e474e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exepowershell.exepowershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1068 4f689ad2542e385c696d18df256e474e.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 956 InstallUtil.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription pid process target process PID 1068 wrote to memory of 1500 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1500 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1500 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1500 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1868 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1868 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1868 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1868 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1800 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1800 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1800 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1800 1068 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 1068 wrote to memory of 1592 1068 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 1068 wrote to memory of 1592 1068 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 1068 wrote to memory of 1592 1068 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 1068 wrote to memory of 1592 1068 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe PID 1068 wrote to memory of 956 1068 4f689ad2542e385c696d18df256e474e.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe"C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe"1⤵
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe" -Force2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/956-73-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/956-60-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-61-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-62-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-64-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-63-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/956-65-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1068-54-0x0000000004840000-0x00000000048E6000-memory.dmpFilesize
664KB
-
memory/1068-55-0x0000000000220000-0x0000000000256000-memory.dmpFilesize
216KB
-
memory/1068-56-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/1068-53-0x0000000001360000-0x0000000001436000-memory.dmpFilesize
856KB
-
memory/1800-57-0x0000000075341000-0x0000000075343000-memory.dmpFilesize
8KB
-
memory/1800-67-0x0000000002530000-0x0000000002531000-memory.dmpFilesize
4KB
-
memory/1800-68-0x0000000002531000-0x0000000002532000-memory.dmpFilesize
4KB
-
memory/1800-70-0x0000000002532000-0x0000000002534000-memory.dmpFilesize
8KB
-
memory/1868-69-0x0000000002461000-0x0000000002462000-memory.dmpFilesize
4KB
-
memory/1868-71-0x0000000002462000-0x0000000002464000-memory.dmpFilesize
8KB
-
memory/1868-66-0x0000000002460000-0x0000000002461000-memory.dmpFilesize
4KB