Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 12:08
Static task
static1
Behavioral task
behavioral1
Sample
935e022330708967113c88e15f8b01c3.exe
Resource
win7-en-20211208
General
-
Target
935e022330708967113c88e15f8b01c3.exe
-
Size
298KB
-
MD5
935e022330708967113c88e15f8b01c3
-
SHA1
7cf14b3324d826a0fed00f66a282ea7c9b9b14eb
-
SHA256
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
-
SHA512
362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
Malware Config
Signatures
-
Async RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/776-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/776-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/776-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/776-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/884-90-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
Data.exeData.exepid process 1780 Data.exe 884 Data.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1836 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
935e022330708967113c88e15f8b01c3.exeData.exedescription pid process target process PID 1592 set thread context of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1780 set thread context of 884 1780 Data.exe Data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1696 schtasks.exe 1384 schtasks.exe 1564 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1964 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
935e022330708967113c88e15f8b01c3.exepowershell.exe935e022330708967113c88e15f8b01c3.exepowershell.exepid process 1592 935e022330708967113c88e15f8b01c3.exe 1592 935e022330708967113c88e15f8b01c3.exe 1036 powershell.exe 776 935e022330708967113c88e15f8b01c3.exe 776 935e022330708967113c88e15f8b01c3.exe 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
935e022330708967113c88e15f8b01c3.exepowershell.exe935e022330708967113c88e15f8b01c3.exepowershell.exeData.exedescription pid process Token: SeDebugPrivilege 1592 935e022330708967113c88e15f8b01c3.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 776 935e022330708967113c88e15f8b01c3.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 884 Data.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
935e022330708967113c88e15f8b01c3.exe935e022330708967113c88e15f8b01c3.execmd.execmd.exeData.exedescription pid process target process PID 1592 wrote to memory of 1036 1592 935e022330708967113c88e15f8b01c3.exe powershell.exe PID 1592 wrote to memory of 1036 1592 935e022330708967113c88e15f8b01c3.exe powershell.exe PID 1592 wrote to memory of 1036 1592 935e022330708967113c88e15f8b01c3.exe powershell.exe PID 1592 wrote to memory of 1036 1592 935e022330708967113c88e15f8b01c3.exe powershell.exe PID 1592 wrote to memory of 1696 1592 935e022330708967113c88e15f8b01c3.exe schtasks.exe PID 1592 wrote to memory of 1696 1592 935e022330708967113c88e15f8b01c3.exe schtasks.exe PID 1592 wrote to memory of 1696 1592 935e022330708967113c88e15f8b01c3.exe schtasks.exe PID 1592 wrote to memory of 1696 1592 935e022330708967113c88e15f8b01c3.exe schtasks.exe PID 1592 wrote to memory of 1052 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 1052 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 1052 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 1052 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 1592 wrote to memory of 776 1592 935e022330708967113c88e15f8b01c3.exe 935e022330708967113c88e15f8b01c3.exe PID 776 wrote to memory of 1352 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1352 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1352 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1352 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1836 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1836 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1836 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 776 wrote to memory of 1836 776 935e022330708967113c88e15f8b01c3.exe cmd.exe PID 1352 wrote to memory of 1384 1352 cmd.exe schtasks.exe PID 1352 wrote to memory of 1384 1352 cmd.exe schtasks.exe PID 1352 wrote to memory of 1384 1352 cmd.exe schtasks.exe PID 1352 wrote to memory of 1384 1352 cmd.exe schtasks.exe PID 1836 wrote to memory of 1964 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 1964 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 1964 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 1964 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 1780 1836 cmd.exe Data.exe PID 1836 wrote to memory of 1780 1836 cmd.exe Data.exe PID 1836 wrote to memory of 1780 1836 cmd.exe Data.exe PID 1836 wrote to memory of 1780 1836 cmd.exe Data.exe PID 1780 wrote to memory of 1728 1780 Data.exe powershell.exe PID 1780 wrote to memory of 1728 1780 Data.exe powershell.exe PID 1780 wrote to memory of 1728 1780 Data.exe powershell.exe PID 1780 wrote to memory of 1728 1780 Data.exe powershell.exe PID 1780 wrote to memory of 1564 1780 Data.exe schtasks.exe PID 1780 wrote to memory of 1564 1780 Data.exe schtasks.exe PID 1780 wrote to memory of 1564 1780 Data.exe schtasks.exe PID 1780 wrote to memory of 1564 1780 Data.exe schtasks.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe PID 1780 wrote to memory of 884 1780 Data.exe Data.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FCA.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"C:\Users\Admin\AppData\Local\Temp\935e022330708967113c88e15f8b01c3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp981B.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Data.exe"C:\Users\Admin\AppData\Roaming\Data.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp40D7.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Data.exe"C:\Users\Admin\AppData\Roaming\Data.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp40D7.tmpMD5
0cd8585adc298e1bb4a5132d8649da3c
SHA1745e012e3502d267b73f31a6b42b08358af583a2
SHA25638d6b4b240bc13214018995ef23fb1f890253eab1f162e3ae8baf011490e2310
SHA51203668e657a8d86ac287d236c6d6ab7ec7c728aa8aea33ca60929a7feb69c96075f84f89e31c91fb1aec94877cd81a751ec89873a64b15062dbeec51a0056a74b
-
C:\Users\Admin\AppData\Local\Temp\tmp7FCA.tmpMD5
0cd8585adc298e1bb4a5132d8649da3c
SHA1745e012e3502d267b73f31a6b42b08358af583a2
SHA25638d6b4b240bc13214018995ef23fb1f890253eab1f162e3ae8baf011490e2310
SHA51203668e657a8d86ac287d236c6d6ab7ec7c728aa8aea33ca60929a7feb69c96075f84f89e31c91fb1aec94877cd81a751ec89873a64b15062dbeec51a0056a74b
-
C:\Users\Admin\AppData\Local\Temp\tmp981B.tmp.batMD5
fe93568fd6216264a18e746a639a7c48
SHA1732ba9a07c8aeaa25d88dcb466aacf33b7d75525
SHA25617cbe1034210d75c5e552e337c289d2d328d58e3bc6eea221b284c0dd91e2554
SHA512ea7b000b6ab5b3cd54275ba4d67e0a811e2f10c5a29aa4f771065626a9f08334c42eef957ff7cc62e009db89eba3474135a8b4e02fd01f2cc4dc72b5d9268739
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msMD5
5124eb877e83b48f2685cd510be8a405
SHA1ec029af27799916cd53b80bba19a707c2504f3cc
SHA256272c076cd6816b991ba8a3ee0267da01607b5ece75c98813f68a2c2a536b8a81
SHA5121e8e381d161a568085e2fded7167a2d7aa8f93b5b66c0689119c2e4a34ea09720728fcc528a955b72ff1cc2611d1f80ec87059d979d89fd2b81aaef9ca368b93
-
\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
memory/776-72-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/776-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/776-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/776-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/776-67-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/776-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/776-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/884-93-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/884-90-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1036-70-0x0000000002490000-0x00000000030DA000-memory.dmpFilesize
12.3MB
-
memory/1036-69-0x0000000002490000-0x00000000030DA000-memory.dmpFilesize
12.3MB
-
memory/1592-58-0x0000000000770000-0x00000000007A8000-memory.dmpFilesize
224KB
-
memory/1592-57-0x0000000000380000-0x000000000038E000-memory.dmpFilesize
56KB
-
memory/1592-56-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/1592-55-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/1592-54-0x00000000013B0000-0x0000000001400000-memory.dmpFilesize
320KB
-
memory/1728-91-0x0000000002530000-0x0000000002573000-memory.dmpFilesize
268KB
-
memory/1780-77-0x0000000000CD0000-0x0000000000D20000-memory.dmpFilesize
320KB
-
memory/1780-79-0x0000000004A20000-0x0000000004A21000-memory.dmpFilesize
4KB
-
memory/1780-80-0x0000000002280000-0x00000000022B8000-memory.dmpFilesize
224KB