Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
04/04/2022, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
Erodo.exe
Resource
win7-20220310-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Erodo.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
Erodo.exe
-
Size
342KB
-
MD5
0d0d64eecf0771dfc73ea6674802c256
-
SHA1
a9eb93937399030d52ce1641794b0fab1c398724
-
SHA256
f927fc3dee7de6daefed3b155907078344fbfec8bd3d63ed96013c2c9ae1e78e
-
SHA512
d424f4ad1298e483d7707d8e8feb5a9bd836830923b487c574b0d1e8cccf3840182e35765220c464e3310caed7c409594af1c2a604302f90d631664ff0765cd1
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
2
C2
212.193.30.54:9524
Mutex
wyQ92!.,=FT72few
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4568-144-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Erodo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vmixtnq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Bdwbnqqn\\Vmixtnq.exe\"" Erodo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 944 set thread context of 4568 944 Erodo.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3068 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1424 powershell.exe 1424 powershell.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 944 Erodo.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erodo.exe"C:\Users\Admin\AppData\Local\Temp\Erodo.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc YwBtAGQAIAAvAGMAIAB0AGkAbQBlAG8AdQB0ACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 203⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\timeout.exetimeout 204⤵
- Delays execution with timeout.exe
PID:3068
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:4568
-