Analysis

  • max time kernel
    117s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24-01-2022 20:46

General

  • Target

    SKM-210221.exe

  • Size

    17KB

  • MD5

    5da85385325f5290a7fae0141809a615

  • SHA1

    0e8d69936b68f66f5cf795b3318b0c13d62c54ac

  • SHA256

    a0255bd8a15446c39c4c32dceab9116c541583938022f13d3846012b9ee4c65f

  • SHA512

    e76b802796a29de2600aa4e8f1fad73945a624d0d8289af9c20e3c1cd2f6b475b4fc99989e29c4b7f8da0652e36b61b3de4811fa9491fa4d89e633bab36d6cce

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKM-210221.exe
    "C:\Users\Admin\AppData\Local\Temp\SKM-210221.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C timeout 10
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Windows\SysWOW64\timeout.exe
        timeout 10
        3⤵
        • Delays execution with timeout.exe
        PID:472
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C timeout 10
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\SysWOW64\timeout.exe
        timeout 10
        3⤵
        • Delays execution with timeout.exe
        PID:636
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
        PID:1144
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        2⤵
          PID:1164
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          2⤵
            PID:1804
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            2⤵
              PID:1048
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              2⤵
                PID:1628
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                2⤵
                  PID:968
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1544

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                MD5

                170dd2268c32df235553da902504624e

                SHA1

                eb90ee039bfda8c76b2b8e9b50625f79fa986757

                SHA256

                816712d74618373bb1a952191c36c15cfc8c56860ebf66e540787dc98cd5ec0b

                SHA512

                db821a1fd37bee78957033e2b00528c1b941a1d87bba01baf25704571e641aabce3ba5777aabdf914eb99282f1d65933b8b69835807904a33f0492b52f8873d0

              • memory/1544-63-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1544-65-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1544-69-0x0000000000480000-0x000000000048A000-memory.dmp
                Filesize

                40KB

              • memory/1544-67-0x0000000002130000-0x0000000002131000-memory.dmp
                Filesize

                4KB

              • memory/1544-64-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1544-61-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1544-62-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1544-60-0x0000000000400000-0x000000000041A000-memory.dmp
                Filesize

                104KB

              • memory/1692-54-0x00000000001C0000-0x00000000001CA000-memory.dmp
                Filesize

                40KB

              • memory/1692-59-0x0000000005000000-0x000000000504C000-memory.dmp
                Filesize

                304KB

              • memory/1692-56-0x0000000005630000-0x0000000005631000-memory.dmp
                Filesize

                4KB

              • memory/1692-58-0x00000000040B0000-0x00000000040E4000-memory.dmp
                Filesize

                208KB

              • memory/1692-55-0x0000000075D61000-0x0000000075D63000-memory.dmp
                Filesize

                8KB

              • memory/1692-57-0x0000000000610000-0x000000000065C000-memory.dmp
                Filesize

                304KB