Analysis

  • max time kernel
    133s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 12:20

General

  • Target

    TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe

  • Size

    72KB

  • MD5

    2be93df9a3c2e9b0809aa24f46d561f8

  • SHA1

    3c3716c0e5721d61afa4997764aa3eaa091505ef

  • SHA256

    fbc9106506d47f39fddb3a48693e9b3eb80f400d6c273d1e08ecc7ef417f9352

  • SHA512

    92e38a52e72d7a69f6f6781b58423a38dc825dfe4ab5156d457897eb757e8a8888a2c3a1360a7ed3b000c9d96a825e2d7b7226c46b70a02bd4ca28ebd24ee78a

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

ufyu78r8r7.duckdns.org:8057

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Async RAT payload 7 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe
    "C:\Users\Admin\AppData\Local\Temp\TRANSFERENCIA DE PAGO A CUENTA BANCARIA DETALLE DE CONFIRMACION IMG-6743856748357485748.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
      2⤵
        PID:1712

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-57-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-58-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-60-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-61-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-62-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-63-0x000000000040C72E-mapping.dmp
    • memory/1712-65-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1712-67-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1756-54-0x0000000000960000-0x0000000000976000-memory.dmp
      Filesize

      88KB

    • memory/1756-55-0x00000000753B1000-0x00000000753B3000-memory.dmp
      Filesize

      8KB

    • memory/1756-56-0x0000000000310000-0x0000000000326000-memory.dmp
      Filesize

      88KB