Analysis
-
max time kernel
4294210s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
04-04-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
Erodo.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Erodo.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Erodo.exe
-
Size
342KB
-
MD5
0d0d64eecf0771dfc73ea6674802c256
-
SHA1
a9eb93937399030d52ce1641794b0fab1c398724
-
SHA256
f927fc3dee7de6daefed3b155907078344fbfec8bd3d63ed96013c2c9ae1e78e
-
SHA512
d424f4ad1298e483d7707d8e8feb5a9bd836830923b487c574b0d1e8cccf3840182e35765220c464e3310caed7c409594af1c2a604302f90d631664ff0765cd1
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
2
C2
212.193.30.54:9524
Mutex
wyQ92!.,=FT72few
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1680-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1680-69-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1680-71-0x000000000040C6BE-mapping.dmp asyncrat behavioral1/memory/1680-70-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1680-73-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1680-75-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Erodo.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vmixtnq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Bdwbnqqn\\Vmixtnq.exe\"" Erodo.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Erodo.exedescription pid Process procid_target PID 2032 set thread context of 1680 2032 Erodo.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1968 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeErodo.exepid Process 1540 powershell.exe 2032 Erodo.exe 2032 Erodo.exe 2032 Erodo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeErodo.exedescription pid Process Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 2032 Erodo.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
Erodo.exepowershell.execmd.exedescription pid Process procid_target PID 2032 wrote to memory of 1540 2032 Erodo.exe 27 PID 2032 wrote to memory of 1540 2032 Erodo.exe 27 PID 2032 wrote to memory of 1540 2032 Erodo.exe 27 PID 2032 wrote to memory of 1540 2032 Erodo.exe 27 PID 1540 wrote to memory of 1944 1540 powershell.exe 29 PID 1540 wrote to memory of 1944 1540 powershell.exe 29 PID 1540 wrote to memory of 1944 1540 powershell.exe 29 PID 1540 wrote to memory of 1944 1540 powershell.exe 29 PID 1944 wrote to memory of 1968 1944 cmd.exe 30 PID 1944 wrote to memory of 1968 1944 cmd.exe 30 PID 1944 wrote to memory of 1968 1944 cmd.exe 30 PID 1944 wrote to memory of 1968 1944 cmd.exe 30 PID 2032 wrote to memory of 384 2032 Erodo.exe 33 PID 2032 wrote to memory of 384 2032 Erodo.exe 33 PID 2032 wrote to memory of 384 2032 Erodo.exe 33 PID 2032 wrote to memory of 384 2032 Erodo.exe 33 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34 PID 2032 wrote to memory of 1680 2032 Erodo.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erodo.exe"C:\Users\Admin\AppData\Local\Temp\Erodo.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc YwBtAGQAIAAvAGMAIAB0AGkAbQBlAG8AdQB0ACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 203⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\timeout.exetimeout 204⤵
- Delays execution with timeout.exe
PID:1968
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1680
-