Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-05-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
be75e9e51767b5a59536afbbf9ffafbc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
be75e9e51767b5a59536afbbf9ffafbc.exe
Resource
win10v2004-20220414-en
General
-
Target
be75e9e51767b5a59536afbbf9ffafbc.exe
-
Size
810KB
-
MD5
be75e9e51767b5a59536afbbf9ffafbc
-
SHA1
78be65d86a6918643092e8e90fd72ad3b9ab997f
-
SHA256
30a4788b9d7eb3c50403737f4af3882b79ba75b8201d53aefb359336f5763745
-
SHA512
4e9f7198dd12adeb21669f74e1cdebe16ac7ccae8e1f29b537438239d1a240a8f1ab890afebe8c1f8603909a1c72b8ce7e7c981f2147fa53dccc6c43b6a3d9e6
Malware Config
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
Executes dropped EXE 1 IoCs
pid Process 3176 test.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation be75e9e51767b5a59536afbbf9ffafbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HGRAyZk0Y950ZeEUrPGcT36so = "C:\\ProgramData\\test\\test.exe" be75e9e51767b5a59536afbbf9ffafbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3164 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3176 test.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 3112 be75e9e51767b5a59536afbbf9ffafbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3112 be75e9e51767b5a59536afbbf9ffafbc.exe Token: SeDebugPrivilege 3112 be75e9e51767b5a59536afbbf9ffafbc.exe Token: SeDebugPrivilege 3176 test.exe Token: SeDebugPrivilege 3176 test.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3112 wrote to memory of 4844 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 83 PID 3112 wrote to memory of 4844 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 83 PID 3112 wrote to memory of 3176 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 88 PID 3112 wrote to memory of 3176 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 88 PID 3112 wrote to memory of 1520 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 89 PID 3112 wrote to memory of 1520 3112 be75e9e51767b5a59536afbbf9ffafbc.exe 89 PID 1520 wrote to memory of 3164 1520 cmd.exe 91 PID 1520 wrote to memory of 3164 1520 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"C:\Users\Admin\AppData\Local\Temp\be75e9e51767b5a59536afbbf9ffafbc.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn HGRAyZk0Y950ZeEUrPGcT36so /tr "C:\ProgramData\test\test.exe" /st 16:34 /du 23:59 /sc daily /ri 1 /f2⤵
- Creates scheduled task(s)
PID:4844
-
-
C:\ProgramData\test\test.exe"C:\ProgramData\test\test.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp89B.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
PID:3164
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
645.3MB
MD556a5ed2808c07a1745f1e0dba01df57e
SHA1ea63ab0954a8f27aeae4182fc610979801c501ce
SHA256a04fe955b0a0ade366323d5b65eec807c8a43f22f8fdd58cc0bcf1cfaff2e7c0
SHA512b3a5f66bf03373a162306d3d0e5d925182b2bc2f7e889a5d15b3c698d5f4a696270c44da00508e9688321e2bd75f640fe4e114021e1c2a835e7c1fc992414316
-
Filesize
645.3MB
MD556a5ed2808c07a1745f1e0dba01df57e
SHA1ea63ab0954a8f27aeae4182fc610979801c501ce
SHA256a04fe955b0a0ade366323d5b65eec807c8a43f22f8fdd58cc0bcf1cfaff2e7c0
SHA512b3a5f66bf03373a162306d3d0e5d925182b2bc2f7e889a5d15b3c698d5f4a696270c44da00508e9688321e2bd75f640fe4e114021e1c2a835e7c1fc992414316
-
Filesize
183B
MD55a3183eb8f56bdd3fd45e3fa6e20e859
SHA167af19f1c46d516b8a19d1c3650ba6dec4498bea
SHA2568f5a7f4a436b3146aa1007d38f75f522833a00418af80f17042ecbeac0d900c7
SHA512ae63fa2dbf341a13bdd0b0bc8d6512895c9ce4752d61678b9e6b2480ce86d66a2b1a3bdf30be06a59f842490caf7c14a3a78de6fa2d9325a4cba68c43137121a