Analysis

  • max time kernel
    117s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    22-01-2022 07:47

General

  • Target

    IMG_212022100120011.exe

  • Size

    69KB

  • MD5

    cecfdefc8f201d03066386a9a6b011f0

  • SHA1

    fd451496139859f387cfef71404d50d042297ca0

  • SHA256

    5b476b935cae4bf02299f7dee135b0bb091fd7716b2973d7172e04f4f2985d72

  • SHA512

    aed76f8f33573fc1b62fd9e194e797fbccb7209e526ef6dc980882c6b889db6b6742e88d8fad0e0e29bc4620b7ae857be02cab380439cb231748c1fbc3d2fd8b

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping google.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Windows\SysWOW64\PING.EXE
        ping google.com
        3⤵
        • Runs ping.exe
        PID:860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping facebook.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\SysWOW64\PING.EXE
        ping facebook.com
        3⤵
        • Runs ping.exe
        PID:3148
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping twitter.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\SysWOW64\PING.EXE
        ping twitter.com
        3⤵
        • Runs ping.exe
        PID:836
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping google.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\SysWOW64\PING.EXE
        ping google.com
        3⤵
        • Runs ping.exe
        PID:4044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping facebook.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Windows\SysWOW64\PING.EXE
        ping facebook.com
        3⤵
        • Runs ping.exe
        PID:4080
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping twitter.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\SysWOW64\PING.EXE
        ping twitter.com
        3⤵
        • Runs ping.exe
        PID:2932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping google.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\SysWOW64\PING.EXE
        ping google.com
        3⤵
        • Runs ping.exe
        PID:1252
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping facebook.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:720
      • C:\Windows\SysWOW64\PING.EXE
        ping facebook.com
        3⤵
        • Runs ping.exe
        PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping twitter.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\PING.EXE
        ping twitter.com
        3⤵
        • Runs ping.exe
        PID:1436
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping google.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\PING.EXE
        ping google.com
        3⤵
        • Runs ping.exe
        PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping facebook.com
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Windows\SysWOW64\PING.EXE
        ping facebook.com
        3⤵
        • Runs ping.exe
        PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping twitter.com
      2⤵
        PID:2300
        • C:\Windows\SysWOW64\PING.EXE
          ping twitter.com
          3⤵
          • Runs ping.exe
          PID:3016
      • C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
        C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
        2⤵
          PID:3844
        • C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
          C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
          2⤵
            PID:3840
          • C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
            C:\Users\Admin\AppData\Local\Temp\IMG_212022100120011.exe
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4016

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IMG_212022100120011.exe.log
          MD5

          991efa4b1d1cef138f583ef9ff666f21

          SHA1

          0d3b02820022451b81975ec3b34e5770565c91f8

          SHA256

          8a1a561eebd06d4022277ff39450dceb5fdc0ffc343d9cf9c84a0d8e874d09e9

          SHA512

          1dfc75426fab9e402fd35c8f4b200790f4b7e6241f128d81e6996aaa427742a1dff7e6db6e321c1c4d76bef631bcf07102bf7940cf59b5f5b4618fc7687da909

        • memory/808-115-0x0000000000280000-0x0000000000296000-memory.dmp
          Filesize

          88KB

        • memory/808-116-0x0000000004A30000-0x0000000004CB1000-memory.dmp
          Filesize

          2.5MB

        • memory/808-117-0x0000000004C40000-0x0000000004C8C000-memory.dmp
          Filesize

          304KB

        • memory/808-118-0x0000000005530000-0x0000000005564000-memory.dmp
          Filesize

          208KB

        • memory/808-119-0x00000000057E0000-0x000000000582C000-memory.dmp
          Filesize

          304KB

        • memory/808-120-0x00000000058D0000-0x0000000005936000-memory.dmp
          Filesize

          408KB

        • memory/4016-121-0x0000000000400000-0x000000000041A000-memory.dmp
          Filesize

          104KB

        • memory/4016-123-0x0000000005500000-0x0000000005501000-memory.dmp
          Filesize

          4KB

        • memory/4016-124-0x0000000002F00000-0x0000000002F0A000-memory.dmp
          Filesize

          40KB

        • memory/4016-125-0x0000000005A10000-0x0000000005AAC000-memory.dmp
          Filesize

          624KB

        • memory/4016-126-0x0000000005FB0000-0x00000000064AE000-memory.dmp
          Filesize

          5.0MB