Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18-02-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
cc1b6971441d2ec84c14247d4f014912.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cc1b6971441d2ec84c14247d4f014912.exe
Resource
win10v2004-en-20220112
General
-
Target
cc1b6971441d2ec84c14247d4f014912.exe
-
Size
32KB
-
MD5
cc1b6971441d2ec84c14247d4f014912
-
SHA1
a786dcb3bffe527a6954d3c242138d34707e21d3
-
SHA256
af1c3dd3dc0c3a7e1b4d829f79077e41e17ce8f95cbdcfef7cc7bc0e5b18c7d8
-
SHA512
a91cf7ebd024a5431ee8e2202740809fb6dace5d4965be107b6f83bbed34f21bde21d45a79e08401791cd204db8d9c23b00d791f8bc5714a6e33022f8aada77b
Malware Config
Extracted
asyncrat
0.5.7B
1
212.193.30.54:8755
gyQ12!.,=FD7trew
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1652-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1652-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1652-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cc1b6971441d2ec84c14247d4f014912.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zdrqamx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Txdlljii\\Zdrqamx.exe\"" cc1b6971441d2ec84c14247d4f014912.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cc1b6971441d2ec84c14247d4f014912.exedescription pid process target process PID 1592 set thread context of 1652 1592 cc1b6971441d2ec84c14247d4f014912.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 10 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1000 PING.EXE 1960 PING.EXE 1404 PING.EXE 1552 PING.EXE 1184 PING.EXE 1724 PING.EXE 1628 PING.EXE 1608 PING.EXE 1500 PING.EXE 1376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cc1b6971441d2ec84c14247d4f014912.exepid process 1592 cc1b6971441d2ec84c14247d4f014912.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
cc1b6971441d2ec84c14247d4f014912.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1592 cc1b6971441d2ec84c14247d4f014912.exe Token: SeDebugPrivilege 1652 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cc1b6971441d2ec84c14247d4f014912.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1592 wrote to memory of 332 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 332 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 332 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 332 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 332 wrote to memory of 1376 332 cmd.exe PING.EXE PID 332 wrote to memory of 1376 332 cmd.exe PING.EXE PID 332 wrote to memory of 1376 332 cmd.exe PING.EXE PID 332 wrote to memory of 1376 332 cmd.exe PING.EXE PID 1592 wrote to memory of 1792 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1792 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1792 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1792 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1792 wrote to memory of 1552 1792 cmd.exe PING.EXE PID 1792 wrote to memory of 1552 1792 cmd.exe PING.EXE PID 1792 wrote to memory of 1552 1792 cmd.exe PING.EXE PID 1792 wrote to memory of 1552 1792 cmd.exe PING.EXE PID 1592 wrote to memory of 1116 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1116 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1116 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1116 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1116 wrote to memory of 1184 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1184 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1184 1116 cmd.exe PING.EXE PID 1116 wrote to memory of 1184 1116 cmd.exe PING.EXE PID 1592 wrote to memory of 1884 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1884 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1884 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1884 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1884 wrote to memory of 1404 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1404 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1404 1884 cmd.exe PING.EXE PID 1884 wrote to memory of 1404 1884 cmd.exe PING.EXE PID 1592 wrote to memory of 1672 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1672 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1672 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1672 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1672 wrote to memory of 1000 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 1000 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 1000 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 1000 1672 cmd.exe PING.EXE PID 1592 wrote to memory of 1976 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1976 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1976 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 1976 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1976 wrote to memory of 1724 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1724 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1724 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1724 1976 cmd.exe PING.EXE PID 1592 wrote to memory of 480 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 480 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 480 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 480 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 480 wrote to memory of 1960 480 cmd.exe PING.EXE PID 480 wrote to memory of 1960 480 cmd.exe PING.EXE PID 480 wrote to memory of 1960 480 cmd.exe PING.EXE PID 480 wrote to memory of 1960 480 cmd.exe PING.EXE PID 1592 wrote to memory of 536 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 536 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 536 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 1592 wrote to memory of 536 1592 cc1b6971441d2ec84c14247d4f014912.exe cmd.exe PID 536 wrote to memory of 1628 536 cmd.exe PING.EXE PID 536 wrote to memory of 1628 536 cmd.exe PING.EXE PID 536 wrote to memory of 1628 536 cmd.exe PING.EXE PID 536 wrote to memory of 1628 536 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc1b6971441d2ec84c14247d4f014912.exe"C:\Users\Admin\AppData\Local\Temp\cc1b6971441d2ec84c14247d4f014912.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping yahoo.com2⤵
-
C:\Windows\SysWOW64\PING.EXEping yahoo.com3⤵
- Runs ping.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1592-54-0x0000000074B6E000-0x0000000074B6F000-memory.dmpFilesize
4KB
-
memory/1592-55-0x00000000003E0000-0x00000000003EE000-memory.dmpFilesize
56KB
-
memory/1592-56-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/1592-57-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/1592-58-0x00000000003F0000-0x000000000048E000-memory.dmpFilesize
632KB
-
memory/1592-59-0x0000000005420000-0x000000000546C000-memory.dmpFilesize
304KB
-
memory/1652-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1652-66-0x0000000074B6E000-0x0000000074B6F000-memory.dmpFilesize
4KB
-
memory/1652-68-0x0000000001210000-0x0000000001211000-memory.dmpFilesize
4KB