Analysis

  • max time kernel
    123s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    26-01-2022 21:02

General

  • Target

    Attachments.exe

  • Size

    18KB

  • MD5

    634a457966e4aebe14c44c204a4fed86

  • SHA1

    f62dfe7c3a0db8ab50d4c858020a57503b479944

  • SHA256

    39f7b43c182fb69287831fd54fc6cc7733a22430f876416cb3a5a60c1da1faa1

  • SHA512

    c0da6e668e74877aab80e6acda09b683aed9145303aa6191cf52589de16d4961f9016f79acd39f932e60e06c700bbb9d5b3943f223c8316eb1a98cb6a4853ecb

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Attachments.exe
    "C:\Users\Admin\AppData\Local\Temp\Attachments.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1152

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1152-145-0x0000000000400000-0x000000000041A000-memory.dmp
    Filesize

    104KB

  • memory/1152-149-0x0000000005810000-0x0000000005D0E000-memory.dmp
    Filesize

    5.0MB

  • memory/1152-148-0x0000000005270000-0x000000000530C000-memory.dmp
    Filesize

    624KB

  • memory/1152-147-0x0000000004F10000-0x0000000004F1A000-memory.dmp
    Filesize

    40KB

  • memory/1152-146-0x0000000004F20000-0x0000000004F21000-memory.dmp
    Filesize

    4KB

  • memory/2924-136-0x000000000A270000-0x000000000A8E8000-memory.dmp
    Filesize

    6.5MB

  • memory/2924-123-0x0000000008090000-0x00000000080F6000-memory.dmp
    Filesize

    408KB

  • memory/2924-125-0x0000000005242000-0x0000000005243000-memory.dmp
    Filesize

    4KB

  • memory/2924-126-0x0000000008350000-0x00000000086A0000-memory.dmp
    Filesize

    3.3MB

  • memory/2924-127-0x0000000007A10000-0x0000000007A2C000-memory.dmp
    Filesize

    112KB

  • memory/2924-128-0x00000000087A0000-0x00000000087EB000-memory.dmp
    Filesize

    300KB

  • memory/2924-129-0x0000000008A70000-0x0000000008AE6000-memory.dmp
    Filesize

    472KB

  • memory/2924-119-0x0000000005250000-0x0000000005286000-memory.dmp
    Filesize

    216KB

  • memory/2924-137-0x0000000009760000-0x000000000977A000-memory.dmp
    Filesize

    104KB

  • memory/2924-124-0x00000000082E0000-0x0000000008346000-memory.dmp
    Filesize

    408KB

  • memory/2924-120-0x0000000005240000-0x0000000005241000-memory.dmp
    Filesize

    4KB

  • memory/2924-121-0x0000000007A60000-0x0000000008088000-memory.dmp
    Filesize

    6.2MB

  • memory/2924-122-0x0000000007870000-0x0000000007892000-memory.dmp
    Filesize

    136KB

  • memory/3440-139-0x0000000005610000-0x0000000005611000-memory.dmp
    Filesize

    4KB

  • memory/3440-144-0x00000000062A0000-0x00000000062EC000-memory.dmp
    Filesize

    304KB

  • memory/3440-143-0x0000000006070000-0x00000000060A4000-memory.dmp
    Filesize

    208KB

  • memory/3440-142-0x0000000006400000-0x00000000064B2000-memory.dmp
    Filesize

    712KB

  • memory/3440-141-0x00000000062F0000-0x0000000006340000-memory.dmp
    Filesize

    320KB

  • memory/3440-140-0x0000000005880000-0x00000000058C2000-memory.dmp
    Filesize

    264KB

  • memory/3440-116-0x0000000000DB0000-0x0000000000DBA000-memory.dmp
    Filesize

    40KB