Analysis
-
max time kernel
123s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
Attachments.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Attachments.exe
Resource
win10-en-20211208
General
-
Target
Attachments.exe
-
Size
18KB
-
MD5
634a457966e4aebe14c44c204a4fed86
-
SHA1
f62dfe7c3a0db8ab50d4c858020a57503b479944
-
SHA256
39f7b43c182fb69287831fd54fc6cc7733a22430f876416cb3a5a60c1da1faa1
-
SHA512
c0da6e668e74877aab80e6acda09b683aed9145303aa6191cf52589de16d4961f9016f79acd39f932e60e06c700bbb9d5b3943f223c8316eb1a98cb6a4853ecb
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1152-145-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Attachments.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\Test = "\"C:\\Users\\Admin\\AppData\\Roaming\\Demo\\Test.exe\"" Attachments.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Attachments.exedescription pid process target process PID 3440 set thread context of 1152 3440 Attachments.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exeAttachments.exepid process 2924 powershell.exe 2924 powershell.exe 2924 powershell.exe 3440 Attachments.exe 3440 Attachments.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeAttachments.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 3440 Attachments.exe Token: SeDebugPrivilege 1152 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Attachments.exedescription pid process target process PID 3440 wrote to memory of 2924 3440 Attachments.exe powershell.exe PID 3440 wrote to memory of 2924 3440 Attachments.exe powershell.exe PID 3440 wrote to memory of 2924 3440 Attachments.exe powershell.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe PID 3440 wrote to memory of 1152 3440 Attachments.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Attachments.exe"C:\Users\Admin\AppData\Local\Temp\Attachments.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1152-145-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1152-149-0x0000000005810000-0x0000000005D0E000-memory.dmpFilesize
5.0MB
-
memory/1152-148-0x0000000005270000-0x000000000530C000-memory.dmpFilesize
624KB
-
memory/1152-147-0x0000000004F10000-0x0000000004F1A000-memory.dmpFilesize
40KB
-
memory/1152-146-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/2924-136-0x000000000A270000-0x000000000A8E8000-memory.dmpFilesize
6.5MB
-
memory/2924-123-0x0000000008090000-0x00000000080F6000-memory.dmpFilesize
408KB
-
memory/2924-125-0x0000000005242000-0x0000000005243000-memory.dmpFilesize
4KB
-
memory/2924-126-0x0000000008350000-0x00000000086A0000-memory.dmpFilesize
3.3MB
-
memory/2924-127-0x0000000007A10000-0x0000000007A2C000-memory.dmpFilesize
112KB
-
memory/2924-128-0x00000000087A0000-0x00000000087EB000-memory.dmpFilesize
300KB
-
memory/2924-129-0x0000000008A70000-0x0000000008AE6000-memory.dmpFilesize
472KB
-
memory/2924-119-0x0000000005250000-0x0000000005286000-memory.dmpFilesize
216KB
-
memory/2924-137-0x0000000009760000-0x000000000977A000-memory.dmpFilesize
104KB
-
memory/2924-124-0x00000000082E0000-0x0000000008346000-memory.dmpFilesize
408KB
-
memory/2924-120-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/2924-121-0x0000000007A60000-0x0000000008088000-memory.dmpFilesize
6.2MB
-
memory/2924-122-0x0000000007870000-0x0000000007892000-memory.dmpFilesize
136KB
-
memory/3440-139-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/3440-144-0x00000000062A0000-0x00000000062EC000-memory.dmpFilesize
304KB
-
memory/3440-143-0x0000000006070000-0x00000000060A4000-memory.dmpFilesize
208KB
-
memory/3440-142-0x0000000006400000-0x00000000064B2000-memory.dmpFilesize
712KB
-
memory/3440-141-0x00000000062F0000-0x0000000006340000-memory.dmpFilesize
320KB
-
memory/3440-140-0x0000000005880000-0x00000000058C2000-memory.dmpFilesize
264KB
-
memory/3440-116-0x0000000000DB0000-0x0000000000DBA000-memory.dmpFilesize
40KB