Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry_TRASKO Ltd.bat.exe
Resource
win7-en-20211208
General
-
Target
Inquiry_TRASKO Ltd.bat.exe
-
Size
675KB
-
MD5
fac3b8f2d85a7876ffa623a67ca3f6ae
-
SHA1
6583251903d4c33ce658bff984db0e24e2db0b2a
-
SHA256
b17340a23a7971818b456182495976b46413f10b7570b3dd78cd189cff3b22f8
-
SHA512
0a29f75e2c843e033aa0110678d5f56d5c3d50bd74e022660c8893f0bd59303defe48233a5425a357c33f53405f6bd7b3947284f3d4cd84623557c6974d61bc9
Malware Config
Extracted
asyncrat
0.5.7B
Default
fforward20.duckdns.org:6606
fforward20.duckdns.org:7707
fforward20.duckdns.org:8808
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/616-123-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/616-128-0x0000000006CD0000-0x0000000006CF2000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquiry_TRASKO Ltd.bat.exedescription pid process target process PID 3552 set thread context of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Inquiry_TRASKO Ltd.bat.exepid process 3552 Inquiry_TRASKO Ltd.bat.exe 3552 Inquiry_TRASKO Ltd.bat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Inquiry_TRASKO Ltd.bat.exeInquiry_TRASKO Ltd.bat.exedescription pid process Token: SeDebugPrivilege 3552 Inquiry_TRASKO Ltd.bat.exe Token: SeDebugPrivilege 616 Inquiry_TRASKO Ltd.bat.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Inquiry_TRASKO Ltd.bat.exedescription pid process target process PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe PID 3552 wrote to memory of 616 3552 Inquiry_TRASKO Ltd.bat.exe Inquiry_TRASKO Ltd.bat.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry_TRASKO Ltd.bat.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry_TRASKO Ltd.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Inquiry_TRASKO Ltd.bat.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry_TRASKO Ltd.bat.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Inquiry_TRASKO Ltd.bat.exe.logMD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
memory/616-123-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/616-129-0x0000000006DD0000-0x0000000006DEE000-memory.dmpFilesize
120KB
-
memory/616-128-0x0000000006CD0000-0x0000000006CF2000-memory.dmpFilesize
136KB
-
memory/616-127-0x0000000006D50000-0x0000000006DC6000-memory.dmpFilesize
472KB
-
memory/616-126-0x0000000005F10000-0x0000000005F76000-memory.dmpFilesize
408KB
-
memory/616-125-0x0000000005460000-0x0000000005461000-memory.dmpFilesize
4KB
-
memory/3552-118-0x0000000004DD0000-0x00000000052CE000-memory.dmpFilesize
5.0MB
-
memory/3552-122-0x0000000007260000-0x000000000729A000-memory.dmpFilesize
232KB
-
memory/3552-121-0x0000000007300000-0x000000000739C000-memory.dmpFilesize
624KB
-
memory/3552-120-0x0000000004F80000-0x0000000004F8C000-memory.dmpFilesize
48KB
-
memory/3552-119-0x0000000004D90000-0x0000000004D9A000-memory.dmpFilesize
40KB
-
memory/3552-115-0x0000000000410000-0x00000000004C0000-memory.dmpFilesize
704KB
-
memory/3552-117-0x0000000004CF0000-0x0000000004D82000-memory.dmpFilesize
584KB
-
memory/3552-116-0x00000000052D0000-0x00000000057CE000-memory.dmpFilesize
5.0MB