Analysis
-
max time kernel
147s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:20
Behavioral task
behavioral1
Sample
PDF 0324.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PDF 0324.exe
Resource
win10v2004-20220414-en
General
-
Target
PDF 0324.exe
-
Size
483KB
-
MD5
fe0d59b23aacdad709f375bdfdf9f14c
-
SHA1
6427f34f2a272415f9dc741392011898fbe38e72
-
SHA256
e163a54c8c3664887553b9a5e335a4dbb58b350634e6b204676bc63e454ba868
-
SHA512
d643e0cb9ed8a0c474d657c6c54f77058fb0dc1ae4268d34e7d69db74e1a6046c63f905bf42b5ca9c1a4a3297325cea8a3d09de5d8c7a11ea35c28a56d4c9d4d
Malware Config
Extracted
asyncrat
0.5.7B
newjob1
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/eeJq8Ku6
Signatures
-
Async RAT payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/848-54-0x00000000002C0000-0x000000000033E000-memory.dmp asyncrat \Users\Admin\AppData\Roaming\ttyu.exe asyncrat C:\Users\Admin\AppData\Roaming\ttyu.exe asyncrat C:\Users\Admin\AppData\Roaming\ttyu.exe asyncrat behavioral1/memory/876-64-0x00000000001D0000-0x000000000024E000-memory.dmp asyncrat behavioral1/memory/1528-72-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/1528-73-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/1528-75-0x000000000040C75E-mapping.dmp asyncrat behavioral1/memory/1528-77-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/1528-78-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/1528-82-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/1528-85-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
ttyu.exeAddInProcess32.exepid process 876 ttyu.exe 1528 AddInProcess32.exe -
Loads dropped DLL 2 IoCs
Processes:
PDF 0324.exettyu.exepid process 848 PDF 0324.exe 876 ttyu.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/848-57-0x00000000003F0000-0x0000000000400000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\ttyt = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\ttyu.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ttyu.exedescription pid process target process PID 876 set thread context of 1528 876 ttyu.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
AddInProcess32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 AddInProcess32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
PDF 0324.exettyu.exepid process 848 PDF 0324.exe 848 PDF 0324.exe 876 ttyu.exe 876 ttyu.exe 876 ttyu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PDF 0324.exettyu.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 848 PDF 0324.exe Token: SeDebugPrivilege 876 ttyu.exe Token: SeDebugPrivilege 1528 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
PDF 0324.execmd.exettyu.exedescription pid process target process PID 848 wrote to memory of 2044 848 PDF 0324.exe cmd.exe PID 848 wrote to memory of 2044 848 PDF 0324.exe cmd.exe PID 848 wrote to memory of 2044 848 PDF 0324.exe cmd.exe PID 848 wrote to memory of 2044 848 PDF 0324.exe cmd.exe PID 2044 wrote to memory of 2012 2044 cmd.exe reg.exe PID 2044 wrote to memory of 2012 2044 cmd.exe reg.exe PID 2044 wrote to memory of 2012 2044 cmd.exe reg.exe PID 2044 wrote to memory of 2012 2044 cmd.exe reg.exe PID 848 wrote to memory of 876 848 PDF 0324.exe ttyu.exe PID 848 wrote to memory of 876 848 PDF 0324.exe ttyu.exe PID 848 wrote to memory of 876 848 PDF 0324.exe ttyu.exe PID 848 wrote to memory of 876 848 PDF 0324.exe ttyu.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe PID 876 wrote to memory of 1528 876 ttyu.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDF 0324.exe"C:\Users\Admin\AppData\Local\Temp\PDF 0324.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v ttyt /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\ttyu.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v ttyt /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\ttyu.exe"3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\ttyu.exe"C:\Users\Admin\AppData\Roaming\ttyu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
C:\Users\Admin\AppData\Roaming\ttyu.exeFilesize
483KB
MD5fe0d59b23aacdad709f375bdfdf9f14c
SHA16427f34f2a272415f9dc741392011898fbe38e72
SHA256e163a54c8c3664887553b9a5e335a4dbb58b350634e6b204676bc63e454ba868
SHA512d643e0cb9ed8a0c474d657c6c54f77058fb0dc1ae4268d34e7d69db74e1a6046c63f905bf42b5ca9c1a4a3297325cea8a3d09de5d8c7a11ea35c28a56d4c9d4d
-
C:\Users\Admin\AppData\Roaming\ttyu.exeFilesize
483KB
MD5fe0d59b23aacdad709f375bdfdf9f14c
SHA16427f34f2a272415f9dc741392011898fbe38e72
SHA256e163a54c8c3664887553b9a5e335a4dbb58b350634e6b204676bc63e454ba868
SHA512d643e0cb9ed8a0c474d657c6c54f77058fb0dc1ae4268d34e7d69db74e1a6046c63f905bf42b5ca9c1a4a3297325cea8a3d09de5d8c7a11ea35c28a56d4c9d4d
-
\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
\Users\Admin\AppData\Roaming\ttyu.exeFilesize
483KB
MD5fe0d59b23aacdad709f375bdfdf9f14c
SHA16427f34f2a272415f9dc741392011898fbe38e72
SHA256e163a54c8c3664887553b9a5e335a4dbb58b350634e6b204676bc63e454ba868
SHA512d643e0cb9ed8a0c474d657c6c54f77058fb0dc1ae4268d34e7d69db74e1a6046c63f905bf42b5ca9c1a4a3297325cea8a3d09de5d8c7a11ea35c28a56d4c9d4d
-
memory/848-56-0x00000000003B0000-0x00000000003E4000-memory.dmpFilesize
208KB
-
memory/848-54-0x00000000002C0000-0x000000000033E000-memory.dmpFilesize
504KB
-
memory/848-55-0x0000000075941000-0x0000000075943000-memory.dmpFilesize
8KB
-
memory/848-57-0x00000000003F0000-0x0000000000400000-memory.dmpFilesize
64KB
-
memory/876-61-0x0000000000000000-mapping.dmp
-
memory/876-66-0x0000000000690000-0x00000000006A0000-memory.dmpFilesize
64KB
-
memory/876-64-0x00000000001D0000-0x000000000024E000-memory.dmpFilesize
504KB
-
memory/1528-73-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-85-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-72-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-70-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-75-0x000000000040C75E-mapping.dmp
-
memory/1528-77-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-78-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-82-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1528-69-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/2012-59-0x0000000000000000-mapping.dmp
-
memory/2044-58-0x0000000000000000-mapping.dmp