Analysis
-
max time kernel
44s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 22:35
Behavioral task
behavioral1
Sample
1660-55-0x0000000000380000-0x0000000000392000-memory.exe
Resource
win7-20220414-en
General
-
Target
1660-55-0x0000000000380000-0x0000000000392000-memory.exe
-
Size
72KB
-
MD5
9200c5f208c0740d4dcf96b1674d383e
-
SHA1
e26e185b70b71f2b320ba466f1e0a775d961ef61
-
SHA256
bed77ad87299dad74adb4da37fb2b8f6e082ce15aa5eab42e560453060c3375b
-
SHA512
276d12bbf5847ea59766ca1a92a856e441cb7e7dcd0eeaa4ec2db5f596daaf9e1d89d6047a7dafcc7aa4efa48bc05af4ae1aba4b7f024ec8732d3a650029a396
Malware Config
Extracted
asyncrat
0.5.6D
Default
milla.publicvm.com:6606
milla.publicvm.com:7707
milla.publicvm.com:8808
ncwfisdaribhhybik
-
delay
10
-
install
true
-
install_file
syastem.exe
-
install_folder
%AppData%
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1600-54-0x0000000000360000-0x0000000000372000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\syastem.exe asyncrat C:\Users\Admin\AppData\Roaming\syastem.exe asyncrat behavioral1/memory/276-63-0x0000000000D50000-0x0000000000D62000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
syastem.exepid process 276 syastem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1972 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1660-55-0x0000000000380000-0x0000000000392000-memory.exepid process 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1660-55-0x0000000000380000-0x0000000000392000-memory.exesyastem.exedescription pid process Token: SeDebugPrivilege 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe Token: SeDebugPrivilege 276 syastem.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1660-55-0x0000000000380000-0x0000000000392000-memory.execmd.execmd.exedescription pid process target process PID 1600 wrote to memory of 1692 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1600 wrote to memory of 1692 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1600 wrote to memory of 1692 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1600 wrote to memory of 2016 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1600 wrote to memory of 2016 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1600 wrote to memory of 2016 1600 1660-55-0x0000000000380000-0x0000000000392000-memory.exe cmd.exe PID 1692 wrote to memory of 1072 1692 cmd.exe schtasks.exe PID 1692 wrote to memory of 1072 1692 cmd.exe schtasks.exe PID 1692 wrote to memory of 1072 1692 cmd.exe schtasks.exe PID 2016 wrote to memory of 1972 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 1972 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 1972 2016 cmd.exe timeout.exe PID 2016 wrote to memory of 276 2016 cmd.exe syastem.exe PID 2016 wrote to memory of 276 2016 cmd.exe syastem.exe PID 2016 wrote to memory of 276 2016 cmd.exe syastem.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1660-55-0x0000000000380000-0x0000000000392000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1660-55-0x0000000000380000-0x0000000000392000-memory.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn 1660-55-0x0000000000380000-0x0000000000392000-memory /tr '"C:\Users\Admin\AppData\Roaming\syastem.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn 1660-55-0x0000000000380000-0x0000000000392000-memory /tr '"C:\Users\Admin\AppData\Roaming\syastem.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp40D8.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\syastem.exe"C:\Users\Admin\AppData\Roaming\syastem.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp40D8.tmp.batFilesize
151B
MD54a89ac65e9df17347f3f7eba56bea1ea
SHA13bd06181d5c6b6a49ad23fe12204c6bd6c425af0
SHA2566cf38837224761fc40dea69092475e061c0ef7f9db15abf8cc9f48e110cf56bf
SHA512748c4142891029acb598b616a3875bdcc141bf8d395d9ff5b33c7461bcdb21ed683a09d9137bd9a42f8742cb64d9d2d67d9e2d590d190067610af33b8c08fcd6
-
C:\Users\Admin\AppData\Roaming\syastem.exeFilesize
72KB
MD59200c5f208c0740d4dcf96b1674d383e
SHA1e26e185b70b71f2b320ba466f1e0a775d961ef61
SHA256bed77ad87299dad74adb4da37fb2b8f6e082ce15aa5eab42e560453060c3375b
SHA512276d12bbf5847ea59766ca1a92a856e441cb7e7dcd0eeaa4ec2db5f596daaf9e1d89d6047a7dafcc7aa4efa48bc05af4ae1aba4b7f024ec8732d3a650029a396
-
C:\Users\Admin\AppData\Roaming\syastem.exeFilesize
72KB
MD59200c5f208c0740d4dcf96b1674d383e
SHA1e26e185b70b71f2b320ba466f1e0a775d961ef61
SHA256bed77ad87299dad74adb4da37fb2b8f6e082ce15aa5eab42e560453060c3375b
SHA512276d12bbf5847ea59766ca1a92a856e441cb7e7dcd0eeaa4ec2db5f596daaf9e1d89d6047a7dafcc7aa4efa48bc05af4ae1aba4b7f024ec8732d3a650029a396
-
memory/276-60-0x0000000000000000-mapping.dmp
-
memory/276-63-0x0000000000D50000-0x0000000000D62000-memory.dmpFilesize
72KB
-
memory/1072-58-0x0000000000000000-mapping.dmp
-
memory/1600-54-0x0000000000360000-0x0000000000372000-memory.dmpFilesize
72KB
-
memory/1692-55-0x0000000000000000-mapping.dmp
-
memory/1972-59-0x0000000000000000-mapping.dmp
-
memory/2016-56-0x0000000000000000-mapping.dmp