Analysis

  • max time kernel
    119s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    26-01-2022 21:02

General

  • Target

    Attachments.exe

  • Size

    18KB

  • MD5

    634a457966e4aebe14c44c204a4fed86

  • SHA1

    f62dfe7c3a0db8ab50d4c858020a57503b479944

  • SHA256

    39f7b43c182fb69287831fd54fc6cc7733a22430f876416cb3a5a60c1da1faa1

  • SHA512

    c0da6e668e74877aab80e6acda09b683aed9145303aa6191cf52589de16d4961f9016f79acd39f932e60e06c700bbb9d5b3943f223c8316eb1a98cb6a4853ecb

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Attachments.exe
    "C:\Users\Admin\AppData\Local\Temp\Attachments.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:1084
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:676

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      785c60f533278f8063b5cf5bb572c6f6

      SHA1

      0ca418d8b64eca8f466ffb175087face60133510

      SHA256

      b1bec1913f421fdab0b21a965ee9f430b50e8109935b97daa1a9959ca8f8a332

      SHA512

      42e96ce632905aaa9934b8a72120abd9419345eda99c76998ac8c05b3a234dbad9c93e2459e1551f3ed7aa014f62e1bf6f847f9277fa85ce7e09218f89e28283

    • memory/592-60-0x00000000022E0000-0x00000000025F0000-memory.dmp
      Filesize

      3.1MB

    • memory/592-59-0x00000000022E0000-0x00000000025F0000-memory.dmp
      Filesize

      3.1MB

    • memory/676-69-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/676-70-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/676-74-0x00000000003E0000-0x00000000003EA000-memory.dmp
      Filesize

      40KB

    • memory/676-72-0x0000000004B60000-0x0000000004B61000-memory.dmp
      Filesize

      4KB

    • memory/676-65-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/676-68-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/676-67-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/676-66-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/1572-63-0x0000000002430000-0x0000000002464000-memory.dmp
      Filesize

      208KB

    • memory/1572-54-0x0000000000A50000-0x0000000000A5A000-memory.dmp
      Filesize

      40KB

    • memory/1572-61-0x0000000002260000-0x0000000002261000-memory.dmp
      Filesize

      4KB

    • memory/1572-64-0x0000000004510000-0x000000000455C000-memory.dmp
      Filesize

      304KB

    • memory/1572-55-0x0000000076C61000-0x0000000076C63000-memory.dmp
      Filesize

      8KB

    • memory/1572-62-0x00000000021B0000-0x00000000021F2000-memory.dmp
      Filesize

      264KB