Analysis
-
max time kernel
119s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 13:15
Behavioral task
behavioral1
Sample
22021cdbf9936f8a469ecb5e11636799.exe
Resource
win7-en-20211208
General
-
Target
22021cdbf9936f8a469ecb5e11636799.exe
-
Size
63KB
-
MD5
22021cdbf9936f8a469ecb5e11636799
-
SHA1
9a3186aaa9fa202c1666d5b751db53b13b961002
-
SHA256
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
-
SHA512
f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
Malware Config
Extracted
asyncrat
1.0.7
Default
bigrussianfloppa.duckdns.org:1001
Mutex_qwqdanchun
-
anti_vm
false
-
bsod
false
-
delay
1
-
install
true
-
install_file
Churkaebanaya.exe
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3836-115-0x00000000009C0000-0x00000000009D6000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe asyncrat C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Churkaebanaya.exepid process 2368 Churkaebanaya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1164 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
22021cdbf9936f8a469ecb5e11636799.exepid process 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe 3836 22021cdbf9936f8a469ecb5e11636799.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
22021cdbf9936f8a469ecb5e11636799.exeChurkaebanaya.exedescription pid process Token: SeDebugPrivilege 3836 22021cdbf9936f8a469ecb5e11636799.exe Token: SeDebugPrivilege 2368 Churkaebanaya.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
22021cdbf9936f8a469ecb5e11636799.execmd.execmd.exedescription pid process target process PID 3836 wrote to memory of 3928 3836 22021cdbf9936f8a469ecb5e11636799.exe cmd.exe PID 3836 wrote to memory of 3928 3836 22021cdbf9936f8a469ecb5e11636799.exe cmd.exe PID 3836 wrote to memory of 384 3836 22021cdbf9936f8a469ecb5e11636799.exe cmd.exe PID 3836 wrote to memory of 384 3836 22021cdbf9936f8a469ecb5e11636799.exe cmd.exe PID 3928 wrote to memory of 1136 3928 cmd.exe schtasks.exe PID 3928 wrote to memory of 1136 3928 cmd.exe schtasks.exe PID 384 wrote to memory of 1164 384 cmd.exe timeout.exe PID 384 wrote to memory of 1164 384 cmd.exe timeout.exe PID 384 wrote to memory of 2368 384 cmd.exe Churkaebanaya.exe PID 384 wrote to memory of 2368 384 cmd.exe Churkaebanaya.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22021cdbf9936f8a469ecb5e11636799.exe"C:\Users\Admin\AppData\Local\Temp\22021cdbf9936f8a469ecb5e11636799.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Churkaebanaya" /tr '"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Churkaebanaya" /tr '"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp411C.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp411C.tmp.batMD5
9299516d8297d409eabcf280c6d82eca
SHA174c524c18fbcdb93187a758c16c8dd798a636117
SHA256358ab48c2fa47519c46fba2dfe009a43be215b1f3f40638629035f69dd6ddb9b
SHA51264438c3be72f52b68d62aa5d37c81ee5af5c862917f5e04291790a5c45fb579dda9524b4a11f0effc8122a79bf082451b1551bc40f3cfc45a17084070c06e83c
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exeMD5
22021cdbf9936f8a469ecb5e11636799
SHA19a3186aaa9fa202c1666d5b751db53b13b961002
SHA256d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
SHA512f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exeMD5
22021cdbf9936f8a469ecb5e11636799
SHA19a3186aaa9fa202c1666d5b751db53b13b961002
SHA256d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
SHA512f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
-
memory/2368-120-0x000000001BAC0000-0x000000001BAC2000-memory.dmpFilesize
8KB
-
memory/3836-115-0x00000000009C0000-0x00000000009D6000-memory.dmpFilesize
88KB
-
memory/3836-116-0x0000000002BB0000-0x0000000002BB2000-memory.dmpFilesize
8KB