Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-07-2022 08:25
Static task
static1
Behavioral task
behavioral1
Sample
Usd 56,335.71$.exe
Resource
win7-20220414-en
General
-
Target
Usd 56,335.71$.exe
-
Size
827KB
-
MD5
e01c94d8c361c5214b81d40d4606940a
-
SHA1
484d35f9015112246a38cccbcb29d8a467d061fb
-
SHA256
7bc9a0135244519fe11232f68560692c4fb9c1d67d3d102d5747d8b89a8e7dd4
-
SHA512
1b1bf67380357324c8570b104c6dd0b9d8ea2a099b26c4b043077c87a78c518f192a0235f4e9c6557acd2ffb688b3ccbfb552908642d8437a254f6c87bed834b
Malware Config
Extracted
asyncrat
1.0.7
Default
seamoney.duckdns.org:5721
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-71-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1212-72-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1212-73-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1212-74-0x000000000041096E-mapping.dmp asyncrat behavioral1/memory/1212-76-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1212-78-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Usd 56,335.71$.exedescription pid process target process PID 756 set thread context of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 1972 powershell.exe 952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeUsd 56,335.71$.exedescription pid process Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 1212 Usd 56,335.71$.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Usd 56,335.71$.exedescription pid process target process PID 756 wrote to memory of 952 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 952 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 952 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 952 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 1972 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 1972 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 1972 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 1972 756 Usd 56,335.71$.exe powershell.exe PID 756 wrote to memory of 1960 756 Usd 56,335.71$.exe schtasks.exe PID 756 wrote to memory of 1960 756 Usd 56,335.71$.exe schtasks.exe PID 756 wrote to memory of 1960 756 Usd 56,335.71$.exe schtasks.exe PID 756 wrote to memory of 1960 756 Usd 56,335.71$.exe schtasks.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe PID 756 wrote to memory of 1212 756 Usd 56,335.71$.exe Usd 56,335.71$.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Usd 56,335.71$.exe"C:\Users\Admin\AppData\Local\Temp\Usd 56,335.71$.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Usd 56,335.71$.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SHhGQnndkQVeW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SHhGQnndkQVeW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp677B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Usd 56,335.71$.exe"C:\Users\Admin\AppData\Local\Temp\Usd 56,335.71$.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp677B.tmpFilesize
1KB
MD51a53aabe4aa04c62ea459b49921ad42c
SHA1f51125d67f79eb1ae40ed6edce4521a0b5d5fdb1
SHA256beb2b03fca9aa823412afdc2821d5fa78e5e865ea8205873c3662520d2c05dc9
SHA512da83ce005a37f65f277820b9e2a91ea2826f70eadd72770ab83934626626f97ca6b0701f382fbec1e1a99b76841876c54f74e45855dafdc037a0473b6fb5429d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD58aa19b3fe6a94c6bed08d637b976e472
SHA1989b087b862c6e6a36b62bfb0273fc6b8acd0107
SHA25638084b5f3024049dc70f2dac2ee59dac94fab1747680a94b07c56da4cb8a1ab3
SHA5128b503fc3f0a6691cc05a74196f0ed990832891560836021f88448c1bbd1f05aee03af319d0f94ce73b1cf04c6a9378c4fd0f212c03e43b5cd72366336936b754
-
memory/756-54-0x0000000000890000-0x0000000000964000-memory.dmpFilesize
848KB
-
memory/756-55-0x00000000763E1000-0x00000000763E3000-memory.dmpFilesize
8KB
-
memory/756-56-0x0000000000410000-0x0000000000426000-memory.dmpFilesize
88KB
-
memory/756-57-0x0000000000530000-0x000000000053A000-memory.dmpFilesize
40KB
-
memory/756-58-0x0000000002090000-0x00000000020E0000-memory.dmpFilesize
320KB
-
memory/756-59-0x0000000004AD5000-0x0000000004AE6000-memory.dmpFilesize
68KB
-
memory/756-67-0x0000000004400000-0x0000000004416000-memory.dmpFilesize
88KB
-
memory/952-60-0x0000000000000000-mapping.dmp
-
memory/952-83-0x000000006B9F0000-0x000000006BF9B000-memory.dmpFilesize
5.7MB
-
memory/952-79-0x000000006B9F0000-0x000000006BF9B000-memory.dmpFilesize
5.7MB
-
memory/1212-69-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-71-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-68-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-72-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-73-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-74-0x000000000041096E-mapping.dmp
-
memory/1212-76-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1212-78-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1960-63-0x0000000000000000-mapping.dmp
-
memory/1972-80-0x000000006B9F0000-0x000000006BF9B000-memory.dmpFilesize
5.7MB
-
memory/1972-82-0x000000006B9F0000-0x000000006BF9B000-memory.dmpFilesize
5.7MB
-
memory/1972-62-0x0000000000000000-mapping.dmp