Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-05-2022 14:30
Static task
static1
Behavioral task
behavioral1
Sample
be75e9e51767b5a59536afbbf9ffafbc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be75e9e51767b5a59536afbbf9ffafbc.exe
Resource
win10v2004-20220414-en
General
-
Target
be75e9e51767b5a59536afbbf9ffafbc.exe
-
Size
810KB
-
MD5
be75e9e51767b5a59536afbbf9ffafbc
-
SHA1
78be65d86a6918643092e8e90fd72ad3b9ab997f
-
SHA256
30a4788b9d7eb3c50403737f4af3882b79ba75b8201d53aefb359336f5763745
-
SHA512
4e9f7198dd12adeb21669f74e1cdebe16ac7ccae8e1f29b537438239d1a240a8f1ab890afebe8c1f8603909a1c72b8ce7e7c981f2147fa53dccc6c43b6a3d9e6
Malware Config
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
Executes dropped EXE 1 IoCs
pid Process 1048 test.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation be75e9e51767b5a59536afbbf9ffafbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HGRAyZk0Y950ZeEUrPGcT36so = "C:\\ProgramData\\test\\test.exe" be75e9e51767b5a59536afbbf9ffafbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2260 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2984 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1048 test.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe 820 be75e9e51767b5a59536afbbf9ffafbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 820 be75e9e51767b5a59536afbbf9ffafbc.exe Token: SeDebugPrivilege 820 be75e9e51767b5a59536afbbf9ffafbc.exe Token: SeDebugPrivilege 1048 test.exe Token: SeDebugPrivilege 1048 test.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 820 wrote to memory of 2260 820 be75e9e51767b5a59536afbbf9ffafbc.exe 83 PID 820 wrote to memory of 2260 820 be75e9e51767b5a59536afbbf9ffafbc.exe 83 PID 820 wrote to memory of 1048 820 be75e9e51767b5a59536afbbf9ffafbc.exe 87 PID 820 wrote to memory of 1048 820 be75e9e51767b5a59536afbbf9ffafbc.exe 87 PID 820 wrote to memory of 2784 820 be75e9e51767b5a59536afbbf9ffafbc.exe 88 PID 820 wrote to memory of 2784 820 be75e9e51767b5a59536afbbf9ffafbc.exe 88 PID 2784 wrote to memory of 2984 2784 cmd.exe 90 PID 2784 wrote to memory of 2984 2784 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn HGRAyZk0Y950ZeEUrPGcT36so /tr "C:\ProgramData\test\test.exe" /st 14:35 /du 23:59 /sc daily /ri 1 /f2⤵
- Creates scheduled task(s)
PID:2260
-
-
C:\ProgramData\test\test.exe"C:\ProgramData\test\test.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF225.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645.3MB
MD58d3c8ff40b959b614b9857f998073e3d
SHA17edc891b06d94ee04a6c070466b7a0eb1809850b
SHA25631a565d9d3567700091c306cc9c893c548a326074849eacdb59f6e79eec48036
SHA51246c4a07297edb0dd467f666c6133cf80e995054512f1a5957b0660bf5862d1ad27dc31e63cc8e618ce37ee0983d695567497f88f7a746b1c29899a7adef199f2
-
Filesize
645.3MB
MD58d3c8ff40b959b614b9857f998073e3d
SHA17edc891b06d94ee04a6c070466b7a0eb1809850b
SHA25631a565d9d3567700091c306cc9c893c548a326074849eacdb59f6e79eec48036
SHA51246c4a07297edb0dd467f666c6133cf80e995054512f1a5957b0660bf5862d1ad27dc31e63cc8e618ce37ee0983d695567497f88f7a746b1c29899a7adef199f2
-
Filesize
184B
MD540b6112667a94eeaef00d5d4e32e1811
SHA19e94b9339c6a2ec0bec6623b04e786748613448c
SHA256730fa3a448181e6869b2f9ef3e7d83b61acfe6ebceb239232e21e70cb8447331
SHA5121422de91b49604dca71e1ac8375396a623151662fdb00afeef0714ba723c00fbc658eaba76549b3350ceab01a5d3ee65b4b85f143c181bd37779eeefc1a3f2ef