Analysis

  • max time kernel
    156s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 05:51

General

  • Target

    6ba563174ba2887b5a2557c19c99be673cbe91010620670e1d7d26c71a012980.exe

  • Size

    48KB

  • MD5

    b419d03103d2ded97801b9ca85709e48

  • SHA1

    5de1b7939a7c6e2478a3e312cdab21649e5cd85f

  • SHA256

    6ba563174ba2887b5a2557c19c99be673cbe91010620670e1d7d26c71a012980

  • SHA512

    f620ca62c2eed661eb9b90f97f8dcbd20fb0e46d1a40740bcac67dbc618500a4e7ffe8b2c0422fec0c3b4a413ec24929f716da654e04a06bc2f9a8b37f79481a

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ba563174ba2887b5a2557c19c99be673cbe91010620670e1d7d26c71a012980.exe
    "C:\Users\Admin\AppData\Local\Temp\6ba563174ba2887b5a2557c19c99be673cbe91010620670e1d7d26c71a012980.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2220
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe b47a8e1714164e10cd3724490779419a omc2//L2GE+ip2xL58nQkA.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:308

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-130-0x00000000002F0000-0x0000000000302000-memory.dmp
    Filesize

    72KB

  • memory/2220-131-0x000000001BBB0000-0x000000001BBB2000-memory.dmp
    Filesize

    8KB