Analysis

  • max time kernel
    38s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 09:51

General

  • Target

    Transferencias Copiar.jar

  • Size

    287KB

  • MD5

    513cc3544b4a0523218326b30e99b46b

  • SHA1

    0927ad5ab4a30014fe0125793729ca9f8a74d95a

  • SHA256

    d021841d4a25bbe872ac7f71427e5731e441a9f6150f6ebb208c664d6ba48acd

  • SHA512

    fe435151e2d374858426777b95c18fb5590ab745815a43e58ad6ae4d6c19610895750d6cebcfc7341cedf6b3ed78c46db06b8d2b74ba889618a54222326a7ecf

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

franmhort.duia.ro:8153

Mutex

Mutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    win.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • STRRAT

    STRRAT is a remote access tool than can steal credentials and log keystrokes.

  • Async RAT payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Transferencias Copiar.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SYSTEM32\wscript.exe
      wscript C:\Users\Admin\mjjrsmctby.js
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\dHqmoqeAFb.js"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
          "C:\Users\Admin\AppData\Roaming\AsyncClient.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2096
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:1936
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF5FD.tmp.bat""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4200
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              6⤵
              • Delays execution with timeout.exe
              PID:4632
            • C:\Users\Admin\AppData\Roaming\win.exe
              "C:\Users\Admin\AppData\Roaming\win.exe"
              6⤵
              • Executes dropped EXE
              PID:4232
      • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\wszkgmhon.txt"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
          "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\wszkgmhon.txt"
          4⤵
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\wszkgmhon.txt"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2088
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Roaming\wszkgmhon.txt"
              6⤵
              • Creates scheduled task(s)
              PID:4876
          • C:\Program Files\Java\jre1.8.0_66\bin\java.exe
            "C:\Program Files\Java\jre1.8.0_66\bin\java.exe" -jar "C:\Users\Admin\AppData\Roaming\wszkgmhon.txt"
            5⤵
              PID:4660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
      Filesize

      50B

      MD5

      dec8f8e1e08ae69cb89f86b6e6050595

      SHA1

      3d1004bc91245ac7043ab751d663f646fe89495e

      SHA256

      d0c2f44d4eee63615c362223b366f8a3c4611e67796c2f2bbb65a6aa797aa884

      SHA512

      6bee4fc74c9652da67d0deff17cac9562fb8839393bd4fa916bd876d7537335197c36991f4a9c55c84d31fc36e99be1e27274d3a64df3dcb0301304902c2afca

    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
      Filesize

      50B

      MD5

      a75e00fa1302dfa206033dd153d13d02

      SHA1

      7aa3f32deb56555c44ec6dc4b323ec92fd6bd985

      SHA256

      49c3adcc8673fa2f2a7733b7a93a36845615ced2a2e530f1932226177015d708

      SHA512

      69cf7d107a96ebc7af1851e39a373b7822562ddaf8e05609852cf0df68a5a7badbd8e1beed16cd01c396ddd75382b1de11263933044db7d8635314e96c536020

    • C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp
      Filesize

      50B

      MD5

      d60a904fd3050a1940e6b453ff9d0f9c

      SHA1

      8adc9087ea5f451fdb7283a7ac170a9737e6d252

      SHA256

      7191de26179d09b0f4cefaa2499a3feeaa0ec5313648074c09535306f019830e

      SHA512

      e4743589e2ab123a741906a7f887b78485792fe22b01ef894f15ffa8d1cd8e8f56908a85d3a473e0fe3c08714d142ab5d7576ca1a50b5e3601c2d2df332bd958

    • C:\Users\Admin\AppData\Local\Temp\tmpF5FD.tmp.bat
      Filesize

      147B

      MD5

      ae874927b6269a8591303e53574e5b1f

      SHA1

      51d8ef9a79a632b145d6746ca02b43a4312cea91

      SHA256

      aaf9bde33c52441e40abb411a80c90ae7d4daf3449bb7afcd4db488063bdebd6

      SHA512

      6e663b20154fd23238b4d2434b6f600f3517e1cfa2dfee20d190493f40e72d3f4e0beb684a7e32073ff36281de7572eb6f4d3b6b9acec00d24ec7fa8890ff838

    • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\AsyncClient.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\dHqmoqeAFb.js
      Filesize

      88KB

      MD5

      10431f8891bb9c5109b16fa0b113c3d5

      SHA1

      d88238c36eaf99364cb4839e16c2c50162e906c1

      SHA256

      726f9c6ad061a7f316ecfff034ef9e1916443d64d79007435a1e1bf101958994

      SHA512

      b3376e7f7d82125e031bc9a3f1b7a74add2591b5b6f8a1e3084775793fa548b20c1629e39b2a6b750eeac3cab668f0acd41671320e025e0c26c573d5ce63924e

    • C:\Users\Admin\AppData\Roaming\lib\jna-5.5.0.jar
      Filesize

      1.4MB

      MD5

      acfb5b5fd9ee10bf69497792fd469f85

      SHA1

      0e0845217c4907822403912ad6828d8e0b256208

      SHA256

      b308faebfe4ed409de8410e0a632d164b2126b035f6eacff968d3908cafb4d9e

      SHA512

      e52575f58a195ceb3bd16b9740eadf5bc5b1d4d63c0734e8e5fd1d1776aa2d068d2e4c7173b83803f95f72c0a6759ae1c9b65773c734250d4cfcdf47a19f82aa

    • C:\Users\Admin\AppData\Roaming\lib\jna-platform-5.5.0.jar
      Filesize

      2.6MB

      MD5

      2f4a99c2758e72ee2b59a73586a2322f

      SHA1

      af38e7c4d0fc73c23ecd785443705bfdee5b90bf

      SHA256

      24d81621f82ac29fcdd9a74116031f5907a2343158e616f4573bbfa2434ae0d5

      SHA512

      b860459a0d3bf7ccb600a03aa1d2ac0358619ee89b2b96ed723541e182b6fdab53aefef7992acb4e03fca67aa47cbe3907b1e6060a60b57ed96c4e00c35c7494

    • C:\Users\Admin\AppData\Roaming\lib\sqlite-jdbc-3.14.2.1.jar
      Filesize

      4.1MB

      MD5

      b33387e15ab150a7bf560abdc73c3bec

      SHA1

      66b8075784131f578ef893fd7674273f709b9a4c

      SHA256

      2eae3dea1c3dde6104c49f9601074b6038ff6abcf3be23f4b56f6720a4f6a491

      SHA512

      25cfb0d6ce35d0bcb18527d3aa12c63ecb2d9c1b8b78805d1306e516c13480b79bb0d74730aa93bd1752f9ac2da9fdd51781c48844cea2fd52a06c62852c8279

    • C:\Users\Admin\AppData\Roaming\lib\system-hook-3.5.jar
      Filesize

      772KB

      MD5

      e1aa38a1e78a76a6de73efae136cdb3a

      SHA1

      c463da71871f780b2e2e5dba115d43953b537daf

      SHA256

      2ddda8af6faef8bde46acf43ec546603180bcf8dcb2e5591fff8ac9cd30b5609

      SHA512

      fee16fe9364926ec337e52f551fd62ed81984808a847de2fd68ff29b6c5da0dcc04ef6d8977f0fe675662a7d2ea1065cdcdd2a5259446226a7c7c5516bd7d60d

    • C:\Users\Admin\AppData\Roaming\win.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\win.exe
      Filesize

      45KB

      MD5

      cbdce3b5e2939fe92312004dcb31151f

      SHA1

      6f11f275c611decd4659f23a4593103f327806a6

      SHA256

      6ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3

      SHA512

      6240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8

    • C:\Users\Admin\AppData\Roaming\wszkgmhon.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • C:\Users\Admin\AppData\Roaming\wszkgmhon.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • C:\Users\Admin\lib\jna-5.5.0.jar
      Filesize

      1.4MB

      MD5

      acfb5b5fd9ee10bf69497792fd469f85

      SHA1

      0e0845217c4907822403912ad6828d8e0b256208

      SHA256

      b308faebfe4ed409de8410e0a632d164b2126b035f6eacff968d3908cafb4d9e

      SHA512

      e52575f58a195ceb3bd16b9740eadf5bc5b1d4d63c0734e8e5fd1d1776aa2d068d2e4c7173b83803f95f72c0a6759ae1c9b65773c734250d4cfcdf47a19f82aa

    • C:\Users\Admin\lib\jna-platform-5.5.0.jar
      Filesize

      2.6MB

      MD5

      2f4a99c2758e72ee2b59a73586a2322f

      SHA1

      af38e7c4d0fc73c23ecd785443705bfdee5b90bf

      SHA256

      24d81621f82ac29fcdd9a74116031f5907a2343158e616f4573bbfa2434ae0d5

      SHA512

      b860459a0d3bf7ccb600a03aa1d2ac0358619ee89b2b96ed723541e182b6fdab53aefef7992acb4e03fca67aa47cbe3907b1e6060a60b57ed96c4e00c35c7494

    • C:\Users\Admin\lib\sqlite-jdbc-3.14.2.1.jar
      Filesize

      4.1MB

      MD5

      b33387e15ab150a7bf560abdc73c3bec

      SHA1

      66b8075784131f578ef893fd7674273f709b9a4c

      SHA256

      2eae3dea1c3dde6104c49f9601074b6038ff6abcf3be23f4b56f6720a4f6a491

      SHA512

      25cfb0d6ce35d0bcb18527d3aa12c63ecb2d9c1b8b78805d1306e516c13480b79bb0d74730aa93bd1752f9ac2da9fdd51781c48844cea2fd52a06c62852c8279

    • C:\Users\Admin\lib\system-hook-3.5.jar
      Filesize

      772KB

      MD5

      e1aa38a1e78a76a6de73efae136cdb3a

      SHA1

      c463da71871f780b2e2e5dba115d43953b537daf

      SHA256

      2ddda8af6faef8bde46acf43ec546603180bcf8dcb2e5591fff8ac9cd30b5609

      SHA512

      fee16fe9364926ec337e52f551fd62ed81984808a847de2fd68ff29b6c5da0dcc04ef6d8977f0fe675662a7d2ea1065cdcdd2a5259446226a7c7c5516bd7d60d

    • C:\Users\Admin\mjjrsmctby.js
      Filesize

      480KB

      MD5

      db0c97c4781ea7c7f09de49fc0d7aa6b

      SHA1

      f36740c3b50cd17e7d679fd5386eb60e2505288e

      SHA256

      a58951a7f9087e40b330ee667c84fc12e884ad609c60450fd6a34e4db16ea559

      SHA512

      6f00a0ec3df2dd6ee0c501d5617b9237cf689753ec06003305ec7f097b9be01bfce86bff949eaab9cdd45e6edaceb37aff1cf3b0dbeeb30b61c04b2f3d7f7349

    • C:\Users\Admin\wszkgmhon.txt
      Filesize

      164KB

      MD5

      f304dd37262f9ca635119593a2de3294

      SHA1

      25814c89b64922fdb5c5b1bdef0c2c79a855f1f6

      SHA256

      dc52c513cb3ededc96b362e314067a51b29cd848ed174361dce17a96e3f7bd3c

      SHA512

      71d9cbbde5c5e9d1bbb0e6244c5e7bb2bbb7e31062469ddf19ce5cf54806103af827bd76e99c8ce75f14b8189f6595511fb1a2c6166e2666360dcbe29e1fa287

    • memory/844-212-0x0000000003240000-0x0000000004240000-memory.dmp
      Filesize

      16.0MB

    • memory/844-190-0x0000000000000000-mapping.dmp
    • memory/964-140-0x0000000000000000-mapping.dmp
    • memory/1172-189-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-200-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-188-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-186-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-195-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-191-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-145-0x0000000000000000-mapping.dmp
    • memory/1172-151-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1172-187-0x0000000002790000-0x0000000003790000-memory.dmp
      Filesize

      16.0MB

    • memory/1936-214-0x0000000000000000-mapping.dmp
    • memory/2088-216-0x0000000000000000-mapping.dmp
    • memory/2096-210-0x0000000000000000-mapping.dmp
    • memory/2668-139-0x0000000002940000-0x0000000003940000-memory.dmp
      Filesize

      16.0MB

    • memory/2740-161-0x0000000000ED0000-0x0000000000EE2000-memory.dmp
      Filesize

      72KB

    • memory/2740-152-0x0000000000000000-mapping.dmp
    • memory/2740-198-0x0000000005810000-0x00000000058AC000-memory.dmp
      Filesize

      624KB

    • memory/3004-143-0x0000000000000000-mapping.dmp
    • memory/4200-211-0x0000000000000000-mapping.dmp
    • memory/4232-235-0x0000000000000000-mapping.dmp
    • memory/4632-215-0x0000000000000000-mapping.dmp
    • memory/4660-217-0x0000000000000000-mapping.dmp
    • memory/4660-229-0x0000000003130000-0x0000000004130000-memory.dmp
      Filesize

      16.0MB

    • memory/4660-241-0x0000000003130000-0x0000000004130000-memory.dmp
      Filesize

      16.0MB

    • memory/4660-242-0x0000000003130000-0x0000000004130000-memory.dmp
      Filesize

      16.0MB

    • memory/4660-247-0x0000000003130000-0x0000000004130000-memory.dmp
      Filesize

      16.0MB

    • memory/4660-248-0x0000000003130000-0x0000000004130000-memory.dmp
      Filesize

      16.0MB

    • memory/4876-223-0x0000000000000000-mapping.dmp