Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
Attachments.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Attachments.exe
Resource
win10-en-20211208
General
-
Target
Attachments.exe
-
Size
18KB
-
MD5
634a457966e4aebe14c44c204a4fed86
-
SHA1
f62dfe7c3a0db8ab50d4c858020a57503b479944
-
SHA256
39f7b43c182fb69287831fd54fc6cc7733a22430f876416cb3a5a60c1da1faa1
-
SHA512
c0da6e668e74877aab80e6acda09b683aed9145303aa6191cf52589de16d4961f9016f79acd39f932e60e06c700bbb9d5b3943f223c8316eb1a98cb6a4853ecb
Malware Config
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/676-68-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/676-67-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/676-69-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/676-70-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Attachments.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Test = "\"C:\\Users\\Admin\\AppData\\Roaming\\Demo\\Test.exe\"" Attachments.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Attachments.exedescription pid process target process PID 1572 set thread context of 676 1572 Attachments.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeAttachments.exepid process 592 powershell.exe 1572 Attachments.exe 1572 Attachments.exe 1572 Attachments.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeAttachments.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 592 powershell.exe Token: SeDebugPrivilege 1572 Attachments.exe Token: SeDebugPrivilege 676 InstallUtil.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
Attachments.exedescription pid process target process PID 1572 wrote to memory of 592 1572 Attachments.exe powershell.exe PID 1572 wrote to memory of 592 1572 Attachments.exe powershell.exe PID 1572 wrote to memory of 592 1572 Attachments.exe powershell.exe PID 1572 wrote to memory of 592 1572 Attachments.exe powershell.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 1084 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe PID 1572 wrote to memory of 676 1572 Attachments.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Attachments.exe"C:\Users\Admin\AppData\Local\Temp\Attachments.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
785c60f533278f8063b5cf5bb572c6f6
SHA10ca418d8b64eca8f466ffb175087face60133510
SHA256b1bec1913f421fdab0b21a965ee9f430b50e8109935b97daa1a9959ca8f8a332
SHA51242e96ce632905aaa9934b8a72120abd9419345eda99c76998ac8c05b3a234dbad9c93e2459e1551f3ed7aa014f62e1bf6f847f9277fa85ce7e09218f89e28283
-
memory/592-60-0x00000000022E0000-0x00000000025F0000-memory.dmpFilesize
3.1MB
-
memory/592-59-0x00000000022E0000-0x00000000025F0000-memory.dmpFilesize
3.1MB
-
memory/676-69-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/676-70-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/676-74-0x00000000003E0000-0x00000000003EA000-memory.dmpFilesize
40KB
-
memory/676-72-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/676-65-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/676-68-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/676-67-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/676-66-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1572-63-0x0000000002430000-0x0000000002464000-memory.dmpFilesize
208KB
-
memory/1572-54-0x0000000000A50000-0x0000000000A5A000-memory.dmpFilesize
40KB
-
memory/1572-61-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/1572-64-0x0000000004510000-0x000000000455C000-memory.dmpFilesize
304KB
-
memory/1572-55-0x0000000076C61000-0x0000000076C63000-memory.dmpFilesize
8KB
-
memory/1572-62-0x00000000021B0000-0x00000000021F2000-memory.dmpFilesize
264KB