Analysis
-
max time kernel
145s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
04-04-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
Erodo.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Erodo.exe
Resource
win10v2004-en-20220113
General
-
Target
Erodo.exe
-
Size
342KB
-
MD5
0d0d64eecf0771dfc73ea6674802c256
-
SHA1
a9eb93937399030d52ce1641794b0fab1c398724
-
SHA256
f927fc3dee7de6daefed3b155907078344fbfec8bd3d63ed96013c2c9ae1e78e
-
SHA512
d424f4ad1298e483d7707d8e8feb5a9bd836830923b487c574b0d1e8cccf3840182e35765220c464e3310caed7c409594af1c2a604302f90d631664ff0765cd1
Malware Config
Extracted
asyncrat
0.5.7B
2
212.193.30.54:9524
wyQ92!.,=FT72few
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4568-144-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Erodo.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Erodo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Erodo.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vmixtnq = "\"C:\\Users\\Admin\\AppData\\Roaming\\Bdwbnqqn\\Vmixtnq.exe\"" Erodo.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Erodo.exedescription pid Process procid_target PID 944 set thread context of 4568 944 Erodo.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 3068 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exeErodo.exepid Process 1424 powershell.exe 1424 powershell.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe 944 Erodo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeErodo.exedescription pid Process Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 944 Erodo.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Erodo.exepowershell.execmd.exedescription pid Process procid_target PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 944 wrote to memory of 1424 944 Erodo.exe 79 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 1424 wrote to memory of 2676 1424 powershell.exe 81 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 2676 wrote to memory of 3068 2676 cmd.exe 82 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 644 944 Erodo.exe 93 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94 PID 944 wrote to memory of 4568 944 Erodo.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erodo.exe"C:\Users\Admin\AppData\Local\Temp\Erodo.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc YwBtAGQAIAAvAGMAIAB0AGkAbQBlAG8AdQB0ACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 203⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\timeout.exetimeout 204⤵
- Delays execution with timeout.exe
PID:3068
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:4568
-