Analysis
-
max time kernel
130s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 06:02
Static task
static1
Behavioral task
behavioral1
Sample
041e966e088ae931009805da96e4997d.exe
Resource
win7-en-20211208
General
-
Target
041e966e088ae931009805da96e4997d.exe
-
Size
624KB
-
MD5
041e966e088ae931009805da96e4997d
-
SHA1
09877b64628255c310a4dd310593a6c52b1db9dc
-
SHA256
bcb3f5843cba83b163c793e06e5d583a021da1c5794fdd7e484e6ad0f9655e8f
-
SHA512
c201f5b6c3a223e2064abcd7966edfd01f5df9f5e5d0c59a4d376141a86a60252e1c5cd6b1409d93dc6ee6ab886d271f5790ebae5d6721361f2f7a044dbf7290
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-127-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
041e966e088ae931009805da96e4997d.exedescription pid process target process PID 2776 set thread context of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
041e966e088ae931009805da96e4997d.exepowershell.exepid process 2776 041e966e088ae931009805da96e4997d.exe 2776 041e966e088ae931009805da96e4997d.exe 956 powershell.exe 956 powershell.exe 956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
041e966e088ae931009805da96e4997d.exepowershell.exe041e966e088ae931009805da96e4997d.exedescription pid process Token: SeDebugPrivilege 2776 041e966e088ae931009805da96e4997d.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 1048 041e966e088ae931009805da96e4997d.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
041e966e088ae931009805da96e4997d.exedescription pid process target process PID 2776 wrote to memory of 956 2776 041e966e088ae931009805da96e4997d.exe powershell.exe PID 2776 wrote to memory of 956 2776 041e966e088ae931009805da96e4997d.exe powershell.exe PID 2776 wrote to memory of 956 2776 041e966e088ae931009805da96e4997d.exe powershell.exe PID 2776 wrote to memory of 1236 2776 041e966e088ae931009805da96e4997d.exe schtasks.exe PID 2776 wrote to memory of 1236 2776 041e966e088ae931009805da96e4997d.exe schtasks.exe PID 2776 wrote to memory of 1236 2776 041e966e088ae931009805da96e4997d.exe schtasks.exe PID 2776 wrote to memory of 816 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 816 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 816 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe PID 2776 wrote to memory of 1048 2776 041e966e088ae931009805da96e4997d.exe 041e966e088ae931009805da96e4997d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\btVAOWX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\btVAOWX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC753.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"C:\Users\Admin\AppData\Local\Temp\041e966e088ae931009805da96e4997d.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\041e966e088ae931009805da96e4997d.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
C:\Users\Admin\AppData\Local\Temp\tmpC753.tmpMD5
5ba7c98dd1936f00d62a26e6dfca9aa5
SHA192cb80506a304a26e6a3ffc7be3a95cd09c33462
SHA2561e6032b5d8e0d4a4c46bcc430e5bd542a64d59ddd5cf11a1af872fc51754b404
SHA5121de37094ef2cb620222432b5f5ab357bf3180ed2fb659a2089dd006fcab5cea22ac54a964befa75f0803220f0e104b7a109bf99b04d0baa8692375ba6e298af7
-
memory/956-138-0x00000000085B0000-0x0000000008626000-memory.dmpFilesize
472KB
-
memory/956-155-0x0000000009760000-0x0000000009805000-memory.dmpFilesize
660KB
-
memory/956-133-0x0000000007540000-0x00000000075A6000-memory.dmpFilesize
408KB
-
memory/956-355-0x00000000070F0000-0x00000000070F8000-memory.dmpFilesize
32KB
-
memory/956-134-0x00000000075B0000-0x0000000007616000-memory.dmpFilesize
408KB
-
memory/956-350-0x0000000007100000-0x000000000711A000-memory.dmpFilesize
104KB
-
memory/956-211-0x0000000007073000-0x0000000007074000-memory.dmpFilesize
4KB
-
memory/956-126-0x0000000004A60000-0x0000000004A96000-memory.dmpFilesize
216KB
-
memory/956-156-0x0000000009960000-0x00000000099F4000-memory.dmpFilesize
592KB
-
memory/956-148-0x0000000009630000-0x0000000009663000-memory.dmpFilesize
204KB
-
memory/956-129-0x00000000076B0000-0x0000000007CD8000-memory.dmpFilesize
6.2MB
-
memory/956-135-0x0000000007EC0000-0x0000000008210000-memory.dmpFilesize
3.3MB
-
memory/956-131-0x0000000007072000-0x0000000007073000-memory.dmpFilesize
4KB
-
memory/956-132-0x00000000073A0000-0x00000000073C2000-memory.dmpFilesize
136KB
-
memory/956-154-0x000000007E380000-0x000000007E381000-memory.dmpFilesize
4KB
-
memory/956-149-0x00000000095F0000-0x000000000960E000-memory.dmpFilesize
120KB
-
memory/956-130-0x0000000007070000-0x0000000007071000-memory.dmpFilesize
4KB
-
memory/956-136-0x0000000007D20000-0x0000000007D3C000-memory.dmpFilesize
112KB
-
memory/956-137-0x0000000008560000-0x00000000085AB000-memory.dmpFilesize
300KB
-
memory/1048-127-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1048-143-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/2776-115-0x0000000000FD0000-0x0000000001072000-memory.dmpFilesize
648KB
-
memory/2776-121-0x00000000081F0000-0x000000000828C000-memory.dmpFilesize
624KB
-
memory/2776-119-0x00000000058C0000-0x00000000058CA000-memory.dmpFilesize
40KB
-
memory/2776-116-0x0000000005D80000-0x000000000627E000-memory.dmpFilesize
5.0MB
-
memory/2776-118-0x0000000005880000-0x0000000005D7E000-memory.dmpFilesize
5.0MB
-
memory/2776-117-0x0000000005920000-0x00000000059B2000-memory.dmpFilesize
584KB
-
memory/2776-122-0x00000000081A0000-0x00000000081DC000-memory.dmpFilesize
240KB
-
memory/2776-120-0x0000000007EB0000-0x0000000007EBC000-memory.dmpFilesize
48KB