Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 12:27
Behavioral task
behavioral1
Sample
76BVN200706awbinformation_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
76BVN200706awbinformation_PDF.exe
Resource
win10v2004-20220414-en
General
-
Target
76BVN200706awbinformation_PDF.exe
-
Size
5.1MB
-
MD5
1082b9039a4b9fafd5d6c40663bed8a2
-
SHA1
7f9a433442b492d6860dcab52b4aa83bfb495222
-
SHA256
ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2
-
SHA512
dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41
Malware Config
Extracted
asyncrat
0.5.7B
GRACE OVERFLOW
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/Q3bqVVf9
Signatures
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1916-130-0x0000000000DB0000-0x00000000012D2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\vgbuild.exe asyncrat C:\Users\Admin\AppData\Roaming\vgbuild.exe asyncrat behavioral2/memory/2600-139-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
vgbuild.exeAddInProcess32.exepid process 3476 vgbuild.exe 2600 AddInProcess32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
76BVN200706awbinformation_PDF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 76BVN200706awbinformation_PDF.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gvbuild = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\vgbuild.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
vgbuild.exedescription pid process target process PID 3476 set thread context of 2600 3476 vgbuild.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
76BVN200706awbinformation_PDF.exevgbuild.exepid process 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 1916 76BVN200706awbinformation_PDF.exe 3476 vgbuild.exe 3476 vgbuild.exe 3476 vgbuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
76BVN200706awbinformation_PDF.exevgbuild.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 1916 76BVN200706awbinformation_PDF.exe Token: SeDebugPrivilege 3476 vgbuild.exe Token: SeDebugPrivilege 2600 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
76BVN200706awbinformation_PDF.execmd.exevgbuild.exedescription pid process target process PID 1916 wrote to memory of 3832 1916 76BVN200706awbinformation_PDF.exe cmd.exe PID 1916 wrote to memory of 3832 1916 76BVN200706awbinformation_PDF.exe cmd.exe PID 1916 wrote to memory of 3832 1916 76BVN200706awbinformation_PDF.exe cmd.exe PID 3832 wrote to memory of 2800 3832 cmd.exe reg.exe PID 3832 wrote to memory of 2800 3832 cmd.exe reg.exe PID 3832 wrote to memory of 2800 3832 cmd.exe reg.exe PID 1916 wrote to memory of 3476 1916 76BVN200706awbinformation_PDF.exe vgbuild.exe PID 1916 wrote to memory of 3476 1916 76BVN200706awbinformation_PDF.exe vgbuild.exe PID 1916 wrote to memory of 3476 1916 76BVN200706awbinformation_PDF.exe vgbuild.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe PID 3476 wrote to memory of 2600 3476 vgbuild.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76BVN200706awbinformation_PDF.exe"C:\Users\Admin\AppData\Local\Temp\76BVN200706awbinformation_PDF.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v gvbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\vgbuild.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v gvbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\vgbuild.exe"3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\vgbuild.exe"C:\Users\Admin\AppData\Roaming\vgbuild.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579
-
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exeFilesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579
-
C:\Users\Admin\AppData\Roaming\vgbuild.exeFilesize
5.1MB
MD51082b9039a4b9fafd5d6c40663bed8a2
SHA17f9a433442b492d6860dcab52b4aa83bfb495222
SHA256ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2
SHA512dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41
-
C:\Users\Admin\AppData\Roaming\vgbuild.exeFilesize
5.1MB
MD51082b9039a4b9fafd5d6c40663bed8a2
SHA17f9a433442b492d6860dcab52b4aa83bfb495222
SHA256ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2
SHA512dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41
-
memory/1916-130-0x0000000000DB0000-0x00000000012D2000-memory.dmpFilesize
5.1MB
-
memory/1916-131-0x0000000006240000-0x00000000067E4000-memory.dmpFilesize
5.6MB
-
memory/1916-132-0x0000000005D90000-0x0000000005E22000-memory.dmpFilesize
584KB
-
memory/2600-138-0x0000000000000000-mapping.dmp
-
memory/2600-139-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2800-134-0x0000000000000000-mapping.dmp
-
memory/3476-135-0x0000000000000000-mapping.dmp
-
memory/3832-133-0x0000000000000000-mapping.dmp