Analysis
-
max time kernel
122s -
max time network
160s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30-01-2022 13:19
General
-
Target
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe
-
Size
63KB
-
MD5
22021cdbf9936f8a469ecb5e11636799
-
SHA1
9a3186aaa9fa202c1666d5b751db53b13b961002
-
SHA256
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
-
SHA512
f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
Malware Config
Extracted
asyncrat
1.0.7
Default
bigrussianfloppa.duckdns.org:1001
Mutex_qwqdanchun
-
anti_vm
false
-
bsod
false
-
delay
1
-
install
true
-
install_file
Churkaebanaya.exe
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT)
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2468-116-0x0000000000F40000-0x0000000000F56000-memory.dmp asyncrat behavioral1/memory/2468-117-0x0000000001740000-0x00000000017F7000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe asyncrat C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Churkaebanaya.exepid process 1524 Churkaebanaya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3516 timeout.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exepid process 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exeChurkaebanaya.exedescription pid process Token: SeDebugPrivilege 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe Token: SeDebugPrivilege 1524 Churkaebanaya.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.execmd.execmd.exedescription pid process target process PID 2468 wrote to memory of 2752 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe cmd.exe PID 2468 wrote to memory of 2752 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe cmd.exe PID 2468 wrote to memory of 668 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe cmd.exe PID 2468 wrote to memory of 668 2468 d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe cmd.exe PID 2752 wrote to memory of 2396 2752 cmd.exe schtasks.exe PID 2752 wrote to memory of 2396 2752 cmd.exe schtasks.exe PID 668 wrote to memory of 3516 668 cmd.exe timeout.exe PID 668 wrote to memory of 3516 668 cmd.exe timeout.exe PID 668 wrote to memory of 1524 668 cmd.exe Churkaebanaya.exe PID 668 wrote to memory of 1524 668 cmd.exe Churkaebanaya.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe"C:\Users\Admin\AppData\Local\Temp\d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Churkaebanaya" /tr '"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Churkaebanaya" /tr '"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBF2.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"C:\Users\Admin\AppData\Roaming\Churkaebanaya.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBF2.tmp.batMD5
c8e06c00af22a5c4f01fd4b3a17b93cb
SHA17eb4f52ff2f0cf238eb2f2068b8b530e067b0a42
SHA256178f5a46ff429ceb41fd22cc2a8b3d71e478947fed2b91301015730199cd9eaa
SHA5129d2f4f1f4d7126a905c15182d1f9d1ad12df9af9e007ade8ee8ab15c68158bd3c0a7c77456009294bd044a05d07302332faa973d4aa3ca0eeccd455d638056ad
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exeMD5
22021cdbf9936f8a469ecb5e11636799
SHA19a3186aaa9fa202c1666d5b751db53b13b961002
SHA256d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
SHA512f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
-
C:\Users\Admin\AppData\Roaming\Churkaebanaya.exeMD5
22021cdbf9936f8a469ecb5e11636799
SHA19a3186aaa9fa202c1666d5b751db53b13b961002
SHA256d775bef532e71e692eb0e66292da60db38864a4f3dba5d2382ace1992ddd55f3
SHA512f3efc9a323bf144cdec2db10e33bdcae5512543cbddc349d21a9ecce9108bc376aa3777cc15f01c3954497091b7bac3c4b8afb9a1c18008c8dc92f4058a9e45b
-
memory/1524-121-0x00000000007D0000-0x00000000007D2000-memory.dmpFilesize
8KB
-
memory/2468-116-0x0000000000F40000-0x0000000000F56000-memory.dmpFilesize
88KB
-
memory/2468-117-0x0000000001740000-0x00000000017F7000-memory.dmpFilesize
732KB