Analysis
-
max time kernel
78s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 21:27
Static task
static1
Behavioral task
behavioral1
Sample
4f689ad2542e385c696d18df256e474e.exe
Resource
win7-en-20211208
General
-
Target
4f689ad2542e385c696d18df256e474e.exe
-
Size
834KB
-
MD5
4f689ad2542e385c696d18df256e474e
-
SHA1
719a2ff49e7f8d5ac4a7b0f7dc2256f8ed45a541
-
SHA256
e7e4f472ffb41d0c2678ceac5a5c236242d46a6c781cf8431b661a3493a05eae
-
SHA512
ae60db8a63c035b2ff322f705b05ce358cac980b4bae750f4a29b8bdee52d89a7bf8c84024add4aa4c65ef0cc71e5b03081b69095599648b430bfb8f1299fb35
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.230.72.132:6606
5.230.72.132:7707
5.230.72.132:8808
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2236-144-0x0000000000400000-0x0000000000414000-memory.dmp asyncrat -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f689ad2542e385c696d18df256e474e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f689ad2542e385c696d18df256e474e.exe -
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe = "0" 4f689ad2542e385c696d18df256e474e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 4f689ad2542e385c696d18df256e474e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 4f689ad2542e385c696d18df256e474e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe = "0" 4f689ad2542e385c696d18df256e474e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\CCECFEFFFBDEFFECBBCBEBB = "C:\\Windows\\Resources\\Themes\\BFEAAAFFBCDBFAFDEFADAACAAD\\svchost.exe" 4f689ad2542e385c696d18df256e474e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4f689ad2542e385c696d18df256e474e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 4f689ad2542e385c696d18df256e474e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription pid process target process PID 2584 set thread context of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe -
Drops file in Windows directory 1 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription ioc process File created C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe 4f689ad2542e385c696d18df256e474e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exepowershell.exepowershell.exepowershell.exepid process 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2684 powershell.exe 1164 powershell.exe 1936 powershell.exe 1164 powershell.exe 2684 powershell.exe 1936 powershell.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2684 powershell.exe 1936 powershell.exe 1164 powershell.exe 2584 4f689ad2542e385c696d18df256e474e.exe 2584 4f689ad2542e385c696d18df256e474e.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exepowershell.exepowershell.exepowershell.exeilasm.exedescription pid process Token: SeDebugPrivilege 2584 4f689ad2542e385c696d18df256e474e.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2236 ilasm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
4f689ad2542e385c696d18df256e474e.exedescription pid process target process PID 2584 wrote to memory of 1164 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 1164 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 1164 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 1936 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 1936 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 1936 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 2684 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 2684 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 2684 2584 4f689ad2542e385c696d18df256e474e.exe powershell.exe PID 2584 wrote to memory of 3108 2584 4f689ad2542e385c696d18df256e474e.exe AddInProcess.exe PID 2584 wrote to memory of 3108 2584 4f689ad2542e385c696d18df256e474e.exe AddInProcess.exe PID 2584 wrote to memory of 1220 2584 4f689ad2542e385c696d18df256e474e.exe AddInUtil.exe PID 2584 wrote to memory of 1220 2584 4f689ad2542e385c696d18df256e474e.exe AddInUtil.exe PID 2584 wrote to memory of 3492 2584 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 2584 wrote to memory of 3492 2584 4f689ad2542e385c696d18df256e474e.exe ComSvcConfig.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe PID 2584 wrote to memory of 2236 2584 4f689ad2542e385c696d18df256e474e.exe ilasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe"C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe"1⤵
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\BFEAAAFFBCDBFAFDEFADAACAAD\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4f689ad2542e385c696d18df256e474e.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ComSvcConfig.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
495e8785b187bad3f9bd60520514cef0
SHA136e0c4b35972e8e676e3b176a04a443a15e0477d
SHA2560e7464c5304466dd15a2f27ebe5c33ff20448b2d57cac6d441d1ceafff3deb7d
SHA512a2c3a1faaae17f2c358e7735dcfee96d24a9dea38305bd1f98b2c0f30ccce7864c7662a846894e2e09dfccfe0aead8d244bcbc2c5b09b13c9f2c2e7e2831029b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
baf455ffbcf72d757735ff0f9fb6f587
SHA18440b30cbe5a9154392bdaa6f80a266a4c4f89a5
SHA256d81f5b16e99e9b05e9c68cd0b0dc6032db6a8d6404bd2726af4b0f11e3e33a90
SHA512709bddd122b438cec0074bc8037d41ca00f622b8d77cae02694097d322b38e03f0af39773f88633b9d0cafbe38b7df32807279e7d108aa5aa5fc1b49a6ea4dd9
-
memory/1164-132-0x00000000011D0000-0x00000000011D1000-memory.dmpFilesize
4KB
-
memory/1164-186-0x0000000009260000-0x0000000009305000-memory.dmpFilesize
660KB
-
memory/1164-184-0x000000007EC00000-0x000000007EC01000-memory.dmpFilesize
4KB
-
memory/1164-172-0x0000000009130000-0x0000000009163000-memory.dmpFilesize
204KB
-
memory/1164-217-0x00000000011D3000-0x00000000011D4000-memory.dmpFilesize
4KB
-
memory/1164-142-0x0000000007C40000-0x0000000007C5C000-memory.dmpFilesize
112KB
-
memory/1164-140-0x0000000007050000-0x00000000070B6000-memory.dmpFilesize
408KB
-
memory/1164-135-0x00000000011D2000-0x00000000011D3000-memory.dmpFilesize
4KB
-
memory/1936-141-0x00000000073C0000-0x0000000007710000-memory.dmpFilesize
3.3MB
-
memory/1936-133-0x00000000012E0000-0x00000000012E1000-memory.dmpFilesize
4KB
-
memory/1936-134-0x00000000012E2000-0x00000000012E3000-memory.dmpFilesize
4KB
-
memory/1936-209-0x00000000012E3000-0x00000000012E4000-memory.dmpFilesize
4KB
-
memory/1936-188-0x000000007EDA0000-0x000000007EDA1000-memory.dmpFilesize
4KB
-
memory/1936-173-0x0000000008C10000-0x0000000008C2E000-memory.dmpFilesize
120KB
-
memory/1936-765-0x0000000006960000-0x000000000697A000-memory.dmpFilesize
104KB
-
memory/2236-205-0x0000000009E60000-0x0000000009E61000-memory.dmpFilesize
4KB
-
memory/2236-144-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2584-122-0x00000000051A0000-0x00000000051D6000-memory.dmpFilesize
216KB
-
memory/2584-120-0x0000000005140000-0x000000000563E000-memory.dmpFilesize
5.0MB
-
memory/2584-119-0x0000000004FF0000-0x000000000500E000-memory.dmpFilesize
120KB
-
memory/2584-118-0x00000000051E0000-0x0000000005272000-memory.dmpFilesize
584KB
-
memory/2584-138-0x0000000007450000-0x000000000745A000-memory.dmpFilesize
40KB
-
memory/2584-117-0x0000000005640000-0x0000000005B3E000-memory.dmpFilesize
5.0MB
-
memory/2584-121-0x00000000052A0000-0x0000000005346000-memory.dmpFilesize
664KB
-
memory/2584-116-0x00000000050C0000-0x0000000005136000-memory.dmpFilesize
472KB
-
memory/2584-114-0x00000000006D0000-0x00000000007A6000-memory.dmpFilesize
856KB
-
memory/2584-115-0x0000000005020000-0x00000000050BC000-memory.dmpFilesize
624KB
-
memory/2584-123-0x0000000006CE0000-0x0000000006D46000-memory.dmpFilesize
408KB
-
memory/2684-130-0x00000000010A0000-0x00000000010D6000-memory.dmpFilesize
216KB
-
memory/2684-190-0x0000000008F30000-0x0000000008FC4000-memory.dmpFilesize
592KB
-
memory/2684-189-0x000000007F4B0000-0x000000007F4B1000-memory.dmpFilesize
4KB
-
memory/2684-213-0x0000000001243000-0x0000000001244000-memory.dmpFilesize
4KB
-
memory/2684-143-0x0000000007A80000-0x0000000007ACB000-memory.dmpFilesize
300KB
-
memory/2684-139-0x0000000006CA0000-0x0000000006CC2000-memory.dmpFilesize
136KB
-
memory/2684-784-0x0000000007E70000-0x0000000007E78000-memory.dmpFilesize
32KB
-
memory/2684-137-0x00000000070D0000-0x00000000076F8000-memory.dmpFilesize
6.2MB
-
memory/2684-136-0x0000000001242000-0x0000000001243000-memory.dmpFilesize
4KB
-
memory/2684-131-0x0000000001240000-0x0000000001241000-memory.dmpFilesize
4KB