Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-01-2022 05:00

General

  • Target

    Ref. # IRQ-21-07778.exe

  • Size

    638KB

  • MD5

    ea1c43b63702044738928927ee2c9703

  • SHA1

    4ec7f29c7e0e2b9e1babd04f94b1297088dc64f7

  • SHA256

    7d1962c7ac6121291ef77096176106435182e49873b65f4438a1c45b4337672a

  • SHA512

    11c8c955877c49e01503f0859d5ba520e44bee678d711a545faff1cd72ab8e516ae3301d4480c267f1ab7a7b033170270568e16cd94fbe60b7973bc1cccfeffb

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

89.238.150.43:57095

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • anti_vm

    false

  • bsod

    false

  • delay

    3

  • install

    true

  • install_file

    chromeex.exe

  • install_folder

    %Temp%

  • pastebin_config

    null

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ref. # IRQ-21-07778.exe
    "C:\Users\Admin\AppData\Local\Temp\Ref. # IRQ-21-07778.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wuYfoDHgED.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2104
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wuYfoDHgED" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D7B.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2052
    • C:\Users\Admin\AppData\Local\Temp\Ref. # IRQ-21-07778.exe
      "C:\Users\Admin\AppData\Local\Temp\Ref. # IRQ-21-07778.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:420
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "chromeex" /tr '"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "chromeex" /tr '"C:\Users\Admin\AppData\Local\Temp\chromeex.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:1740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8643.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:3984
        • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
          "C:\Users\Admin\AppData\Local\Temp\chromeex.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3232
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wuYfoDHgED.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2236
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wuYfoDHgED" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A84.tmp"
            5⤵
            • Creates scheduled task(s)
            PID:3044
          • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
            "C:\Users\Admin\AppData\Local\Temp\chromeex.exe"
            5⤵
            • Executes dropped EXE
            PID:1536
          • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
            "C:\Users\Admin\AppData\Local\Temp\chromeex.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1088
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\yvbyfi.exe"' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2396
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\yvbyfi.exe"'
                7⤵
                  PID:664
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\oqnvot.exe"' & exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3208
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\oqnvot.exe"'
                  7⤵
                    PID:3832

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ref. # IRQ-21-07778.exe.log
        MD5

        0c2899d7c6746f42d5bbe088c777f94c

        SHA1

        622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

        SHA256

        5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

        SHA512

        ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        MD5

        1c19c16e21c97ed42d5beabc93391fc5

        SHA1

        8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

        SHA256

        1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

        SHA512

        7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        ab765467aa57281dcdd8d6bb81be11a1

        SHA1

        afa495226dc5eb9a6954a03709c55442e76bf0a9

        SHA256

        93c2e0f77817b92579b2010453317c3e659008a9cfa6814f9e7fb92ef3275383

        SHA512

        0bdea4c47a274670523ae7d2be0e26c210f1bfd4b2a2b1c9f77562af71de1d4d7ad4b6988fe3233c370c0a669b12ca315a9b89ba2745ffaf36a61d0e99a611d5

      • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
        MD5

        ea1c43b63702044738928927ee2c9703

        SHA1

        4ec7f29c7e0e2b9e1babd04f94b1297088dc64f7

        SHA256

        7d1962c7ac6121291ef77096176106435182e49873b65f4438a1c45b4337672a

        SHA512

        11c8c955877c49e01503f0859d5ba520e44bee678d711a545faff1cd72ab8e516ae3301d4480c267f1ab7a7b033170270568e16cd94fbe60b7973bc1cccfeffb

      • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
        MD5

        ea1c43b63702044738928927ee2c9703

        SHA1

        4ec7f29c7e0e2b9e1babd04f94b1297088dc64f7

        SHA256

        7d1962c7ac6121291ef77096176106435182e49873b65f4438a1c45b4337672a

        SHA512

        11c8c955877c49e01503f0859d5ba520e44bee678d711a545faff1cd72ab8e516ae3301d4480c267f1ab7a7b033170270568e16cd94fbe60b7973bc1cccfeffb

      • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
        MD5

        ea1c43b63702044738928927ee2c9703

        SHA1

        4ec7f29c7e0e2b9e1babd04f94b1297088dc64f7

        SHA256

        7d1962c7ac6121291ef77096176106435182e49873b65f4438a1c45b4337672a

        SHA512

        11c8c955877c49e01503f0859d5ba520e44bee678d711a545faff1cd72ab8e516ae3301d4480c267f1ab7a7b033170270568e16cd94fbe60b7973bc1cccfeffb

      • C:\Users\Admin\AppData\Local\Temp\chromeex.exe
        MD5

        ea1c43b63702044738928927ee2c9703

        SHA1

        4ec7f29c7e0e2b9e1babd04f94b1297088dc64f7

        SHA256

        7d1962c7ac6121291ef77096176106435182e49873b65f4438a1c45b4337672a

        SHA512

        11c8c955877c49e01503f0859d5ba520e44bee678d711a545faff1cd72ab8e516ae3301d4480c267f1ab7a7b033170270568e16cd94fbe60b7973bc1cccfeffb

      • C:\Users\Admin\AppData\Local\Temp\tmp1A84.tmp
        MD5

        32a4943e3ec52564386b200784a5dc3a

        SHA1

        5cb101f36447faabb2cf6e4cb20e20cd5770d4c3

        SHA256

        f52653148d9c8a6a7957d9988356d9895f7d54d918a1baabb2148040244ecf5a

        SHA512

        9b3bc72ec747599697269e252cda53e57e2f0186119020675525e7e4535ff2602efb664a68a5d62c6815f6a0e46ab7b67e7cd1c6aa6d54fa80b00e93389ea67b

      • C:\Users\Admin\AppData\Local\Temp\tmp6D7B.tmp
        MD5

        32a4943e3ec52564386b200784a5dc3a

        SHA1

        5cb101f36447faabb2cf6e4cb20e20cd5770d4c3

        SHA256

        f52653148d9c8a6a7957d9988356d9895f7d54d918a1baabb2148040244ecf5a

        SHA512

        9b3bc72ec747599697269e252cda53e57e2f0186119020675525e7e4535ff2602efb664a68a5d62c6815f6a0e46ab7b67e7cd1c6aa6d54fa80b00e93389ea67b

      • C:\Users\Admin\AppData\Local\Temp\tmp8643.tmp.bat
        MD5

        0d56a8145a6c96ee6e2fb45c429fbd28

        SHA1

        ee2746ca92fa1218c8f28e2a4b8557b577a4a6b3

        SHA256

        ccb5ac18a3e72c9b180f162d55aad906fcb4c0187cb5dc5a0ae144b25bc959e9

        SHA512

        612414fb97620edd76e32630198f53ae9d0403b3bb25db8e7ac86721a67d4a751ce3962d97c8db82c19992b36674c0d9335bc3c20c24a75c2c264bb6040947ee

      • memory/420-140-0x0000000005450000-0x0000000005451000-memory.dmp
        Filesize

        4KB

      • memory/420-128-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1088-614-0x0000000006D90000-0x0000000006D9A000-memory.dmp
        Filesize

        40KB

      • memory/1088-475-0x0000000005240000-0x0000000005241000-memory.dmp
        Filesize

        4KB

      • memory/1088-611-0x0000000006BA0000-0x0000000006C1E000-memory.dmp
        Filesize

        504KB

      • memory/1088-612-0x0000000006D20000-0x0000000006D3E000-memory.dmp
        Filesize

        120KB

      • memory/1088-613-0x0000000006E20000-0x0000000007170000-memory.dmp
        Filesize

        3.3MB

      • memory/1088-615-0x0000000007170000-0x0000000007200000-memory.dmp
        Filesize

        576KB

      • memory/1088-616-0x0000000007200000-0x0000000007260000-memory.dmp
        Filesize

        384KB

      • memory/1088-617-0x00000000073E0000-0x000000000742B000-memory.dmp
        Filesize

        300KB

      • memory/1088-618-0x0000000006B00000-0x0000000006B22000-memory.dmp
        Filesize

        136KB

      • memory/2104-157-0x0000000008FD0000-0x0000000009064000-memory.dmp
        Filesize

        592KB

      • memory/2104-133-0x0000000004302000-0x0000000004303000-memory.dmp
        Filesize

        4KB

      • memory/2104-138-0x0000000007930000-0x000000000797B000-memory.dmp
        Filesize

        300KB

      • memory/2104-137-0x0000000007380000-0x000000000739C000-memory.dmp
        Filesize

        112KB

      • memory/2104-150-0x0000000008CD0000-0x0000000008D03000-memory.dmp
        Filesize

        204KB

      • memory/2104-151-0x0000000008C90000-0x0000000008CAE000-memory.dmp
        Filesize

        120KB

      • memory/2104-156-0x0000000008E00000-0x0000000008EA5000-memory.dmp
        Filesize

        660KB

      • memory/2104-127-0x00000000042A0000-0x00000000042D6000-memory.dmp
        Filesize

        216KB

      • memory/2104-212-0x000000007F8B0000-0x000000007F8B1000-memory.dmp
        Filesize

        4KB

      • memory/2104-213-0x0000000004303000-0x0000000004304000-memory.dmp
        Filesize

        4KB

      • memory/2104-136-0x00000000075A0000-0x00000000078F0000-memory.dmp
        Filesize

        3.3MB

      • memory/2104-135-0x0000000006C90000-0x0000000006CF6000-memory.dmp
        Filesize

        408KB

      • memory/2104-130-0x0000000006D00000-0x0000000007328000-memory.dmp
        Filesize

        6.2MB

      • memory/2104-131-0x0000000006A80000-0x0000000006AA2000-memory.dmp
        Filesize

        136KB

      • memory/2104-356-0x0000000008F60000-0x0000000008F7A000-memory.dmp
        Filesize

        104KB

      • memory/2104-361-0x0000000008F50000-0x0000000008F58000-memory.dmp
        Filesize

        32KB

      • memory/2104-134-0x0000000006C20000-0x0000000006C86000-memory.dmp
        Filesize

        408KB

      • memory/2104-139-0x0000000007CB0000-0x0000000007D26000-memory.dmp
        Filesize

        472KB

      • memory/2104-132-0x0000000004300000-0x0000000004301000-memory.dmp
        Filesize

        4KB

      • memory/2236-382-0x0000000004E30000-0x0000000004E31000-memory.dmp
        Filesize

        4KB

      • memory/2236-383-0x0000000004E32000-0x0000000004E33000-memory.dmp
        Filesize

        4KB

      • memory/2236-385-0x0000000008BE0000-0x0000000008C2B000-memory.dmp
        Filesize

        300KB

      • memory/2236-398-0x0000000009C20000-0x0000000009CC5000-memory.dmp
        Filesize

        660KB

      • memory/2236-458-0x000000007EEE0000-0x000000007EEE1000-memory.dmp
        Filesize

        4KB

      • memory/2236-459-0x0000000004E33000-0x0000000004E34000-memory.dmp
        Filesize

        4KB

      • memory/3232-233-0x000000007E190000-0x000000007E191000-memory.dmp
        Filesize

        4KB

      • memory/3232-232-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
        Filesize

        4KB

      • memory/3776-115-0x0000000000860000-0x0000000000906000-memory.dmp
        Filesize

        664KB

      • memory/3776-123-0x00000000077D0000-0x0000000007852000-memory.dmp
        Filesize

        520KB

      • memory/3776-122-0x0000000006ED0000-0x0000000006EDE000-memory.dmp
        Filesize

        56KB

      • memory/3776-121-0x000000007E540000-0x000000007E541000-memory.dmp
        Filesize

        4KB

      • memory/3776-120-0x0000000006EF0000-0x0000000006F8C000-memory.dmp
        Filesize

        624KB

      • memory/3776-119-0x00000000050A0000-0x0000000005132000-memory.dmp
        Filesize

        584KB

      • memory/3776-118-0x0000000005170000-0x000000000517A000-memory.dmp
        Filesize

        40KB

      • memory/3776-117-0x00000000051C0000-0x0000000005252000-memory.dmp
        Filesize

        584KB

      • memory/3776-116-0x00000000056C0000-0x0000000005BBE000-memory.dmp
        Filesize

        5.0MB