Analysis

  • max time kernel
    151s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 14:45

General

  • Target

    Tax Invoice.exe

  • Size

    239KB

  • MD5

    f3e095480b743b91e227a56dc90f961f

  • SHA1

    c173a87c984a20bf5e3751351e144a62de4ae269

  • SHA256

    762c259cf0068e583cc70d8839c65bb87401de2f926f8306c66d83e7d7cfda8e

  • SHA512

    d7fb57e80d720221aeb1674d7aa967e3c87b334f13c76c26e81d22cc0877d4921deffe37670093de83ebcbf488cdf654eadd12ce9cbd97517068621ec3a15de0

Malware Config

Extracted

Family

asyncrat

Version

0.5.6A

C2

soft.tjsosda.com:1989

sure.spdns.de:1989

hurricane.rapiddns.ru:1989

Mutex

admin2214

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tax Invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\Tax Invoice.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1120

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1016-54-0x00000000010A0000-0x00000000010E0000-memory.dmp
    Filesize

    256KB

  • memory/1016-55-0x0000000000360000-0x0000000000378000-memory.dmp
    Filesize

    96KB

  • memory/1016-58-0x00000000003F0000-0x00000000003F3000-memory.dmp
    Filesize

    12KB

  • memory/1120-56-0x000000000040CCEE-mapping.dmp
  • memory/1120-57-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1120-59-0x0000000075F61000-0x0000000075F63000-memory.dmp
    Filesize

    8KB