Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 09:51

General

  • Target

    Transferencias Copiar.jar

  • Size

    287KB

  • MD5

    513cc3544b4a0523218326b30e99b46b

  • SHA1

    0927ad5ab4a30014fe0125793729ca9f8a74d95a

  • SHA256

    d021841d4a25bbe872ac7f71427e5731e441a9f6150f6ebb208c664d6ba48acd

  • SHA512

    fe435151e2d374858426777b95c18fb5590ab745815a43e58ad6ae4d6c19610895750d6cebcfc7341cedf6b3ed78c46db06b8d2b74ba889618a54222326a7ecf

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

franmhort.duia.ro:8153

Mutex

Mutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    win.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Async RAT payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Transferencias Copiar.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Admin\mjjrsmctby.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dHqmoqeAFb.js"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
          "C:\Users\Admin\AppData\Roaming\AsyncClient.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:972
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:1112
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBC4E.tmp.bat""
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:920
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              6⤵
              • Delays execution with timeout.exe
              PID:1484
            • C:\Users\Admin\AppData\Roaming\win.exe
              "C:\Users\Admin\AppData\Roaming\win.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1296
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\arkhamqi.txt"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Program Files\Java\jre7\bin\java.exe
          "C:\Program Files\Java\jre7\bin\java.exe" -jar "C:\Users\Admin\arkhamqi.txt"
          4⤵
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Windows\system32\cmd.exe
            cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\arkhamqi.txt"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\arkhamqi.txt"
              6⤵
              • Creates scheduled task(s)
              PID:240
          • C:\Program Files\Java\jre7\bin\java.exe
            "C:\Program Files\Java\jre7\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\arkhamqi.txt"
            5⤵
              PID:1356

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpBC4E.tmp.bat
      Filesize

      147B

      MD5

      640985918c7a7538a155c072534da02a

      SHA1

      d24f2ba45d617ee1d5f5f73f25cd0569345bfe60

      SHA256

      95a9bd9cb9fb426996505f2a9078f5b65ac54096c6fbbfccab6f04b3e9158013

      SHA512

      74af364b8aa40c84ce1757bfaa50e1d2cf9e9a638e0a4db3d79eb196e6638d49cdac5b36ca9ab9aac175f458b29d0726f732a35f6331d00e04bf7eb8a5b82f59

    • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\arkhamqi.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • C:\Users\Admin\AppData\Roaming\arkhamqi.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • C:\Users\Admin\AppData\Roaming\dHqmoqeAFb.js
      Filesize

      88KB

      MD5

      10431f8891bb9c5109b16fa0b113c3d5

      SHA1

      d88238c36eaf99364cb4839e16c2c50162e906c1

      SHA256

      726f9c6ad061a7f316ecfff034ef9e1916443d64d79007435a1e1bf101958994

      SHA512

      b3376e7f7d82125e031bc9a3f1b7a74add2591b5b6f8a1e3084775793fa548b20c1629e39b2a6b750eeac3cab668f0acd41671320e025e0c26c573d5ce63924e

    • C:\Users\Admin\AppData\Roaming\win.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\win.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\arkhamqi.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • C:\Users\Admin\lib\jna-5.5.0.jar
      Filesize

      1.4MB

      MD5

      acfb5b5fd9ee10bf69497792fd469f85

      SHA1

      0e0845217c4907822403912ad6828d8e0b256208

      SHA256

      b308faebfe4ed409de8410e0a632d164b2126b035f6eacff968d3908cafb4d9e

      SHA512

      e52575f58a195ceb3bd16b9740eadf5bc5b1d4d63c0734e8e5fd1d1776aa2d068d2e4c7173b83803f95f72c0a6759ae1c9b65773c734250d4cfcdf47a19f82aa

    • C:\Users\Admin\lib\jna-platform-5.5.0.jar
      Filesize

      2.6MB

      MD5

      2f4a99c2758e72ee2b59a73586a2322f

      SHA1

      af38e7c4d0fc73c23ecd785443705bfdee5b90bf

      SHA256

      24d81621f82ac29fcdd9a74116031f5907a2343158e616f4573bbfa2434ae0d5

      SHA512

      b860459a0d3bf7ccb600a03aa1d2ac0358619ee89b2b96ed723541e182b6fdab53aefef7992acb4e03fca67aa47cbe3907b1e6060a60b57ed96c4e00c35c7494

    • C:\Users\Admin\lib\sqlite-jdbc-3.14.2.1.jar
      Filesize

      4.1MB

      MD5

      b33387e15ab150a7bf560abdc73c3bec

      SHA1

      66b8075784131f578ef893fd7674273f709b9a4c

      SHA256

      2eae3dea1c3dde6104c49f9601074b6038ff6abcf3be23f4b56f6720a4f6a491

      SHA512

      25cfb0d6ce35d0bcb18527d3aa12c63ecb2d9c1b8b78805d1306e516c13480b79bb0d74730aa93bd1752f9ac2da9fdd51781c48844cea2fd52a06c62852c8279

    • C:\Users\Admin\lib\system-hook-3.5.jar
      Filesize

      772KB

      MD5

      e1aa38a1e78a76a6de73efae136cdb3a

      SHA1

      c463da71871f780b2e2e5dba115d43953b537daf

      SHA256

      2ddda8af6faef8bde46acf43ec546603180bcf8dcb2e5591fff8ac9cd30b5609

      SHA512

      fee16fe9364926ec337e52f551fd62ed81984808a847de2fd68ff29b6c5da0dcc04ef6d8977f0fe675662a7d2ea1065cdcdd2a5259446226a7c7c5516bd7d60d

    • C:\Users\Admin\mjjrsmctby.js
      Filesize

      480KB

      MD5

      db0c97c4781ea7c7f09de49fc0d7aa6b

      SHA1

      f36740c3b50cd17e7d679fd5386eb60e2505288e

      SHA256

      a58951a7f9087e40b330ee667c84fc12e884ad609c60450fd6a34e4db16ea559

      SHA512

      6f00a0ec3df2dd6ee0c501d5617b9237cf689753ec06003305ec7f097b9be01bfce86bff949eaab9cdd45e6edaceb37aff1cf3b0dbeeb30b61c04b2f3d7f7349

    • \Users\Admin\AppData\Roaming\win.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • memory/240-123-0x0000000000000000-mapping.dmp
    • memory/860-69-0x0000000000000000-mapping.dmp
    • memory/920-91-0x0000000000000000-mapping.dmp
    • memory/972-90-0x0000000000000000-mapping.dmp
    • memory/1040-65-0x0000000000000000-mapping.dmp
    • memory/1056-72-0x0000000000000000-mapping.dmp
    • memory/1056-88-0x0000000002230000-0x0000000005230000-memory.dmp
      Filesize

      48.0MB

    • memory/1112-92-0x0000000000000000-mapping.dmp
    • memory/1296-100-0x0000000000000000-mapping.dmp
    • memory/1296-102-0x0000000001080000-0x0000000001092000-memory.dmp
      Filesize

      72KB

    • memory/1356-136-0x0000000002260000-0x0000000005260000-memory.dmp
      Filesize

      48.0MB

    • memory/1356-131-0x0000000002260000-0x0000000005260000-memory.dmp
      Filesize

      48.0MB

    • memory/1356-122-0x0000000000000000-mapping.dmp
    • memory/1388-89-0x0000000075401000-0x0000000075403000-memory.dmp
      Filesize

      8KB

    • memory/1388-74-0x0000000000000000-mapping.dmp
    • memory/1388-87-0x00000000001C0000-0x00000000001D2000-memory.dmp
      Filesize

      72KB

    • memory/1484-94-0x0000000000000000-mapping.dmp
    • memory/1948-54-0x000007FEFC021000-0x000007FEFC023000-memory.dmp
      Filesize

      8KB

    • memory/1948-61-0x0000000002080000-0x0000000005080000-memory.dmp
      Filesize

      48.0MB

    • memory/2036-121-0x0000000000000000-mapping.dmp
    • memory/2044-113-0x00000000020B0000-0x00000000050B0000-memory.dmp
      Filesize

      48.0MB

    • memory/2044-103-0x0000000000000000-mapping.dmp