Analysis
-
max time kernel
118s -
max time network
163s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 00:51
Static task
static1
Behavioral task
behavioral1
Sample
InvPROV-NTI-EXX-DECK-22-008.exe
Resource
win7-en-20211208
General
-
Target
InvPROV-NTI-EXX-DECK-22-008.exe
-
Size
292KB
-
MD5
1d142d1d500fdfbe3b7ef592a9a8895a
-
SHA1
e345c0434b4a276fec0855b8536723cd01466f9c
-
SHA256
f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25
-
SHA512
33df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a
Malware Config
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/832-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/832-60-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/832-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/832-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1304-80-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1304-87-0x0000000000BC0000-0x0000000000BE2000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
MicrosoftDoc.exeMicrosoftDoc.exepid process 2012 MicrosoftDoc.exe 1304 MicrosoftDoc.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1280 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
InvPROV-NTI-EXX-DECK-22-008.exeMicrosoftDoc.exedescription pid process target process PID 1668 set thread context of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 2012 set thread context of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 432 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
InvPROV-NTI-EXX-DECK-22-008.exeInvPROV-NTI-EXX-DECK-22-008.exepid process 1668 InvPROV-NTI-EXX-DECK-22-008.exe 832 InvPROV-NTI-EXX-DECK-22-008.exe 832 InvPROV-NTI-EXX-DECK-22-008.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
InvPROV-NTI-EXX-DECK-22-008.exeInvPROV-NTI-EXX-DECK-22-008.exeMicrosoftDoc.exedescription pid process Token: SeDebugPrivilege 1668 InvPROV-NTI-EXX-DECK-22-008.exe Token: SeDebugPrivilege 832 InvPROV-NTI-EXX-DECK-22-008.exe Token: SeDebugPrivilege 1304 MicrosoftDoc.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
InvPROV-NTI-EXX-DECK-22-008.exeInvPROV-NTI-EXX-DECK-22-008.execmd.execmd.exeMicrosoftDoc.exedescription pid process target process PID 1668 wrote to memory of 964 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 964 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 964 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 964 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 1668 wrote to memory of 832 1668 InvPROV-NTI-EXX-DECK-22-008.exe InvPROV-NTI-EXX-DECK-22-008.exe PID 832 wrote to memory of 1928 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1928 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1928 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1928 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1280 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1280 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1280 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 832 wrote to memory of 1280 832 InvPROV-NTI-EXX-DECK-22-008.exe cmd.exe PID 1280 wrote to memory of 432 1280 cmd.exe timeout.exe PID 1280 wrote to memory of 432 1280 cmd.exe timeout.exe PID 1280 wrote to memory of 432 1280 cmd.exe timeout.exe PID 1280 wrote to memory of 432 1280 cmd.exe timeout.exe PID 1928 wrote to memory of 276 1928 cmd.exe schtasks.exe PID 1928 wrote to memory of 276 1928 cmd.exe schtasks.exe PID 1928 wrote to memory of 276 1928 cmd.exe schtasks.exe PID 1928 wrote to memory of 276 1928 cmd.exe schtasks.exe PID 1280 wrote to memory of 2012 1280 cmd.exe MicrosoftDoc.exe PID 1280 wrote to memory of 2012 1280 cmd.exe MicrosoftDoc.exe PID 1280 wrote to memory of 2012 1280 cmd.exe MicrosoftDoc.exe PID 1280 wrote to memory of 2012 1280 cmd.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe PID 2012 wrote to memory of 1304 2012 MicrosoftDoc.exe MicrosoftDoc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"C:\Users\Admin\AppData\Local\Temp\InvPROV-NTI-EXX-DECK-22-008.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MicrosoftDoc" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MicrosoftDoc" /tr '"C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2137.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp2137.tmp.batMD5
8ed1703f1e5b4d2a3c3aaef058ec7b9c
SHA1a2849fcfb25284ac39c386c1328dfaab6d381e64
SHA2569558d391175808861f49ce539021a8ba63037c850023aa996bc912b79039d5f2
SHA51267f9b448b200df21603a1e5efabdd1e4e013dd76a9eca893aef31f94dd0677400233ec3815ccea608ff4c47739823084d21f397a2f7b6e374d79d138cad4e1af
-
C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exeMD5
1d142d1d500fdfbe3b7ef592a9a8895a
SHA1e345c0434b4a276fec0855b8536723cd01466f9c
SHA256f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25
SHA51233df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a
-
C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exeMD5
1d142d1d500fdfbe3b7ef592a9a8895a
SHA1e345c0434b4a276fec0855b8536723cd01466f9c
SHA256f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25
SHA51233df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a
-
C:\Users\Admin\AppData\Roaming\MicrosoftDoc.exeMD5
1d142d1d500fdfbe3b7ef592a9a8895a
SHA1e345c0434b4a276fec0855b8536723cd01466f9c
SHA256f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25
SHA51233df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a
-
\Users\Admin\AppData\Roaming\MicrosoftDoc.exeMD5
1d142d1d500fdfbe3b7ef592a9a8895a
SHA1e345c0434b4a276fec0855b8536723cd01466f9c
SHA256f85fb30beeceb9e2721aa12deee155bb604c0a364f926da18644af7e6e5c7a25
SHA51233df0626b5669d5dbfde5916c37d66fbfac82ce6faed53febef0c2336bfb16a59214e37080ffc10a01bff8a9463a510b874ca1a627699a8526d3d719009aa52a
-
memory/832-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/832-66-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/1304-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1304-82-0x00000000021B0000-0x00000000021B1000-memory.dmpFilesize
4KB
-
memory/1304-87-0x0000000000BC0000-0x0000000000BE2000-memory.dmpFilesize
136KB
-
memory/1304-86-0x0000000005660000-0x00000000056C0000-memory.dmpFilesize
384KB
-
memory/1304-85-0x0000000006090000-0x0000000006120000-memory.dmpFilesize
576KB
-
memory/1304-84-0x0000000000830000-0x000000000083A000-memory.dmpFilesize
40KB
-
memory/1304-83-0x0000000005D10000-0x0000000005D8E000-memory.dmpFilesize
504KB
-
memory/1668-62-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/1668-57-0x0000000000530000-0x0000000000546000-memory.dmpFilesize
88KB
-
memory/1668-54-0x0000000000A60000-0x0000000000AB0000-memory.dmpFilesize
320KB
-
memory/1668-55-0x0000000000A20000-0x0000000000A50000-memory.dmpFilesize
192KB
-
memory/1668-56-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/2012-73-0x00000000003C0000-0x00000000003D6000-memory.dmpFilesize
88KB
-
memory/2012-71-0x00000000009C0000-0x0000000000A10000-memory.dmpFilesize
320KB