Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
Attachments.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Attachments.exe
Resource
win10-en-20211208
General
-
Target
Attachments.exe
-
Size
18KB
-
MD5
634a457966e4aebe14c44c204a4fed86
-
SHA1
f62dfe7c3a0db8ab50d4c858020a57503b479944
-
SHA256
39f7b43c182fb69287831fd54fc6cc7733a22430f876416cb3a5a60c1da1faa1
-
SHA512
c0da6e668e74877aab80e6acda09b683aed9145303aa6191cf52589de16d4961f9016f79acd39f932e60e06c700bbb9d5b3943f223c8316eb1a98cb6a4853ecb
Malware Config
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1932-68-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/1932-69-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/1932-70-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat behavioral1/memory/1932-71-0x0000000000400000-0x000000000041A000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Attachments.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Test = "\"C:\\Users\\Admin\\AppData\\Roaming\\Demo\\Test.exe\"" Attachments.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Attachments.exedescription pid process target process PID 960 set thread context of 1932 960 Attachments.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exeAttachments.exepid process 1500 powershell.exe 960 Attachments.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeAttachments.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 960 Attachments.exe Token: SeDebugPrivilege 1932 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Attachments.exedescription pid process target process PID 960 wrote to memory of 1500 960 Attachments.exe powershell.exe PID 960 wrote to memory of 1500 960 Attachments.exe powershell.exe PID 960 wrote to memory of 1500 960 Attachments.exe powershell.exe PID 960 wrote to memory of 1500 960 Attachments.exe powershell.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe PID 960 wrote to memory of 1932 960 Attachments.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Attachments.exe"C:\Users\Admin\AppData\Local\Temp\Attachments.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
32b1478ea2ffc457d558d4eaac07bf5a
SHA17e1756522eb8a10e27bf86970f9096a05aee732d
SHA256c440f9175efa17bd3777b5b47eb658d8cdd0f31ca9cd78b7dacd1ec64d0a4998
SHA5128a6a071741fd17a2146906babccc907a4909bc8f99cab0a833f8fa25d54ef0aca39f7cad9c2888e08006f0c2776c767273e5e656ef686a5a7f6f76442ddfab30
-
memory/960-64-0x00000000046F0000-0x0000000004724000-memory.dmpFilesize
208KB
-
memory/960-55-0x0000000075D11000-0x0000000075D13000-memory.dmpFilesize
8KB
-
memory/960-65-0x0000000004940000-0x000000000498C000-memory.dmpFilesize
304KB
-
memory/960-54-0x0000000000E90000-0x0000000000E9A000-memory.dmpFilesize
40KB
-
memory/960-62-0x0000000004880000-0x0000000004881000-memory.dmpFilesize
4KB
-
memory/960-63-0x0000000004820000-0x0000000004862000-memory.dmpFilesize
264KB
-
memory/1500-61-0x0000000001D82000-0x0000000001D84000-memory.dmpFilesize
8KB
-
memory/1500-60-0x0000000001D81000-0x0000000001D82000-memory.dmpFilesize
4KB
-
memory/1500-59-0x0000000001D80000-0x0000000001D81000-memory.dmpFilesize
4KB
-
memory/1932-66-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-67-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-68-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-69-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-70-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-71-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/1932-73-0x0000000004AF0000-0x0000000004AF1000-memory.dmpFilesize
4KB
-
memory/1932-75-0x0000000000440000-0x000000000044A000-memory.dmpFilesize
40KB