Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    26-01-2022 12:16

General

  • Target

    9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe

  • Size

    298KB

  • MD5

    935e022330708967113c88e15f8b01c3

  • SHA1

    7cf14b3324d826a0fed00f66a282ea7c9b9b14eb

  • SHA256

    9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5

  • SHA512

    362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1184
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA98A.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe
      "C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"
      2⤵
        PID:3120
      • C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe
        "C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3984
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"'
            4⤵
            • Creates scheduled task(s)
            PID:3980
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBF06.tmp.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:2300
          • C:\Users\Admin\AppData\Roaming\Data.exe
            "C:\Users\Admin\AppData\Roaming\Data.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3664
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3132
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp66CF.tmp"
              5⤵
              • Creates scheduled task(s)
              PID:2992
            • C:\Users\Admin\AppData\Roaming\Data.exe
              "C:\Users\Admin\AppData\Roaming\Data.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1856

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe.log
      MD5

      b1a97e7c826ffc38c8d2c00eb49b8a01

      SHA1

      2d094c94fbcecd045370b1470fe77d10128ccac4

      SHA256

      c7c76581c6e385d9b79c074273d3335fe2d0bd3880e2dee2b64dd2f9f3106944

      SHA512

      ed4e770718235213d5c54ff8966b87cdb37fc392ae5abe1eb8d8dd6a8832cf8a28a33dc10d3c582cf480853c41a6680401e6f2acab473548f5cb30a8e1b8965f

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Data.exe.log
      MD5

      b1a97e7c826ffc38c8d2c00eb49b8a01

      SHA1

      2d094c94fbcecd045370b1470fe77d10128ccac4

      SHA256

      c7c76581c6e385d9b79c074273d3335fe2d0bd3880e2dee2b64dd2f9f3106944

      SHA512

      ed4e770718235213d5c54ff8966b87cdb37fc392ae5abe1eb8d8dd6a8832cf8a28a33dc10d3c582cf480853c41a6680401e6f2acab473548f5cb30a8e1b8965f

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      a978add4212f80b5b00c3101780cb3fd

      SHA1

      fae244889d8b63c456e9e3db441abffaa8591b2b

      SHA256

      e2598192b61100090c5179c3d2c2cdd375631e83dafeb929d31cf90e92181b30

      SHA512

      4ae97ed6ad176393706e6dd4a2704df2bf3ec1c71fbc325ef25aaa916eb747c6c7d0e8d39c5e3aedfbeb6224862cb56bcad85147fb47f2dfa29cb9092888549f

    • C:\Users\Admin\AppData\Local\Temp\tmp66CF.tmp
      MD5

      19b1ee69e7ac810f6d8cdb1d74cf81dd

      SHA1

      75cfa7aa808953a13d970c5c9eca83d08e3e1931

      SHA256

      4d9acdc88e7bb06f992f99707fda84ea5f4d18b3d6480b16c661cfe221a36290

      SHA512

      33bc02b6c187639ef3bf8567453feae54488c0a78035bdcd18586788ee68d449acea3b55aff9953d0490af795c5b9675273bcf0b63e9180dd6fbd04e467631e3

    • C:\Users\Admin\AppData\Local\Temp\tmpA98A.tmp
      MD5

      19b1ee69e7ac810f6d8cdb1d74cf81dd

      SHA1

      75cfa7aa808953a13d970c5c9eca83d08e3e1931

      SHA256

      4d9acdc88e7bb06f992f99707fda84ea5f4d18b3d6480b16c661cfe221a36290

      SHA512

      33bc02b6c187639ef3bf8567453feae54488c0a78035bdcd18586788ee68d449acea3b55aff9953d0490af795c5b9675273bcf0b63e9180dd6fbd04e467631e3

    • C:\Users\Admin\AppData\Local\Temp\tmpBF06.tmp.bat
      MD5

      23cccf5649e53fd412fd69db8b79e353

      SHA1

      82c7e5ce4eafcc0b39c081b0661b07dc75927cf9

      SHA256

      e09d7842f5f1ab5b258159470be2b18ee3ac1df3e7edf425fa56495949bfcbdd

      SHA512

      f5e1c609d03e82b99083f636eb1c835a184bd1a8fd9d90fb52ccaa5fb959162565269b74bcf6be63ec90f0a0c27f0a69da6ce52f3e9d88e887351b9ca3c66ecb

    • C:\Users\Admin\AppData\Roaming\Data.exe
      MD5

      935e022330708967113c88e15f8b01c3

      SHA1

      7cf14b3324d826a0fed00f66a282ea7c9b9b14eb

      SHA256

      9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5

      SHA512

      362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca

    • C:\Users\Admin\AppData\Roaming\Data.exe
      MD5

      935e022330708967113c88e15f8b01c3

      SHA1

      7cf14b3324d826a0fed00f66a282ea7c9b9b14eb

      SHA256

      9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5

      SHA512

      362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca

    • C:\Users\Admin\AppData\Roaming\Data.exe
      MD5

      935e022330708967113c88e15f8b01c3

      SHA1

      7cf14b3324d826a0fed00f66a282ea7c9b9b14eb

      SHA256

      9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5

      SHA512

      362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca

    • memory/1184-135-0x0000000007F70000-0x00000000082C0000-memory.dmp
      Filesize

      3.3MB

    • memory/1184-150-0x00000000094A0000-0x00000000094BE000-memory.dmp
      Filesize

      120KB

    • memory/1184-129-0x0000000006FD0000-0x0000000006FD1000-memory.dmp
      Filesize

      4KB

    • memory/1184-130-0x0000000007610000-0x0000000007C38000-memory.dmp
      Filesize

      6.2MB

    • memory/1184-131-0x0000000006FD2000-0x0000000006FD3000-memory.dmp
      Filesize

      4KB

    • memory/1184-132-0x0000000007570000-0x0000000007592000-memory.dmp
      Filesize

      136KB

    • memory/1184-148-0x00000000094C0000-0x00000000094F3000-memory.dmp
      Filesize

      204KB

    • memory/1184-134-0x0000000007F00000-0x0000000007F66000-memory.dmp
      Filesize

      408KB

    • memory/1184-126-0x0000000006E80000-0x0000000006EB6000-memory.dmp
      Filesize

      216KB

    • memory/1184-136-0x00000000071B0000-0x00000000071CC000-memory.dmp
      Filesize

      112KB

    • memory/1184-137-0x0000000008460000-0x00000000084AB000-memory.dmp
      Filesize

      300KB

    • memory/1184-138-0x00000000086B0000-0x0000000008726000-memory.dmp
      Filesize

      472KB

    • memory/1184-360-0x0000000009970000-0x0000000009978000-memory.dmp
      Filesize

      32KB

    • memory/1184-133-0x0000000007C40000-0x0000000007CA6000-memory.dmp
      Filesize

      408KB

    • memory/1184-355-0x0000000009980000-0x000000000999A000-memory.dmp
      Filesize

      104KB

    • memory/1184-227-0x0000000006FD3000-0x0000000006FD4000-memory.dmp
      Filesize

      4KB

    • memory/1184-158-0x00000000099F0000-0x0000000009A84000-memory.dmp
      Filesize

      592KB

    • memory/1184-156-0x0000000009810000-0x00000000098B5000-memory.dmp
      Filesize

      660KB

    • memory/1184-157-0x000000007E600000-0x000000007E601000-memory.dmp
      Filesize

      4KB

    • memory/1856-607-0x00000000058A0000-0x00000000058A1000-memory.dmp
      Filesize

      4KB

    • memory/2476-122-0x0000000008F80000-0x0000000008FCB000-memory.dmp
      Filesize

      300KB

    • memory/2476-115-0x0000000000CF0000-0x0000000000D40000-memory.dmp
      Filesize

      320KB

    • memory/2476-121-0x0000000005800000-0x000000000580E000-memory.dmp
      Filesize

      56KB

    • memory/2476-120-0x0000000005690000-0x0000000005B8E000-memory.dmp
      Filesize

      5.0MB

    • memory/2476-119-0x0000000005810000-0x00000000058AC000-memory.dmp
      Filesize

      624KB

    • memory/2476-123-0x0000000009020000-0x0000000009058000-memory.dmp
      Filesize

      224KB

    • memory/2476-118-0x0000000005560000-0x000000000556A000-memory.dmp
      Filesize

      40KB

    • memory/2476-117-0x0000000005590000-0x0000000005622000-memory.dmp
      Filesize

      584KB

    • memory/2476-116-0x0000000005B90000-0x000000000608E000-memory.dmp
      Filesize

      5.0MB

    • memory/3132-385-0x0000000000BE2000-0x0000000000BE3000-memory.dmp
      Filesize

      4KB

    • memory/3132-383-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
      Filesize

      4KB

    • memory/3132-436-0x0000000000BE3000-0x0000000000BE4000-memory.dmp
      Filesize

      4KB

    • memory/3132-434-0x000000007E740000-0x000000007E741000-memory.dmp
      Filesize

      4KB

    • memory/3664-285-0x0000000004AE0000-0x0000000004FDE000-memory.dmp
      Filesize

      5.0MB

    • memory/3984-128-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/3984-139-0x0000000002EA0000-0x0000000002EA1000-memory.dmp
      Filesize

      4KB