Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-07-2022 18:05

General

  • Target

    0x0009000000008527-56.exe

  • Size

    64KB

  • MD5

    c75c0d8d46633692c979eb6fbd26094e

  • SHA1

    b3945681b32a90f00ef2fd2af2eb4f5d4208c75d

  • SHA256

    bbd275db0ec38e99c088654b042b682c428ba644969ef08f1d9657052f9b1393

  • SHA512

    5d4ecd6c3fee2cf25cdfc4c6abbb389b261016b805ab1f6c4f0918143df6b02f0647d6ba87b1169ef0040ea9afd0dd22ce2612e2600b48e6dd9ffd7be99a1067

Malware Config

Extracted

Family

asyncrat

Version

true

Botnet

Linkvertise A

Mutex

RRAT_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    Explorer.exe

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 6 IoCs
  • XMRig Miner Payload 14 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 41 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0009000000008527-56.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0009000000008527-56.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Explorer" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Explorer" /tr '"C:\Users\Admin\AppData\Roaming\Explorer.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:1996
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp228F.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1988
      • C:\Users\Admin\AppData\Roaming\Explorer.exe
        "C:\Users\Admin\AppData\Roaming\Explorer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fkmaku.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:668
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\fkmaku.exe"'
            5⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:828
            • C:\Users\Admin\AppData\Local\Temp\fkmaku.exe
              "C:\Users\Admin\AppData\Local\Temp\fkmaku.exe"
              6⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:856
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:948
                • C:\Windows\system32\powercfg.exe
                  powercfg /x -hibernate-timeout-ac 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1828
                • C:\Windows\system32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1704
                • C:\Windows\system32\powercfg.exe
                  powercfg /x -standby-timeout-ac 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:556
                • C:\Windows\system32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2000
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "GoogleUpdateTaskMachineQC" /tr "\"C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe\""
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1464
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "GoogleUpdateTaskMachineQC" /tr "\"C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe\""
                  8⤵
                  • Creates scheduled task(s)
                  PID:1812
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /run /tn "GoogleUpdateTaskMachineQC"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1336
                • C:\Windows\system32\schtasks.exe
                  schtasks /run /tn "GoogleUpdateTaskMachineQC"
                  8⤵
                    PID:1308
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\fkmaku.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2036
                  • C:\Windows\system32\choice.exe
                    choice /C Y /N /D Y /T 3
                    8⤵
                      PID:1568
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {4C4055A2-1F01-4751-8240-4EFBBA627701} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]
        1⤵
        • Loads dropped DLL
        PID:1988
        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          2⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1332
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            3⤵
              PID:1112
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:364
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1824
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1716
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1592
            • C:\Windows\System32\conhost.exe
              C:\Windows\System32\conhost.exe "dggflaynvupj"
              3⤵
                PID:1540
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe iaksldfjay0 6E3sjfZq2rJQaxvLPmXgsAaJL0DB0Mzj1hMFCmTULB1n9LKJbqR3eVDuPucevfH0b+OPIvkK2Xyez82evvYGdcDpLl7Y66K6fxf6jfs4VGo3ULwYEVRHZvjLiXSITyhyphzcH9wfrjUtJScs0gscUFkeL2zRe6Hgg/WeyJqRunq35vECVFMq1WYi79T7a9OKv63MNmu8FG6+Qpuz7I3zqyU+nSC30poDPmP3SJI4wTieDZbNX+dDx0QqoemoKQ27N096XA8oSOcO03I8W7hX3u14mAeQMpwlIsC/foEE1yBwV8MTK1Bm0vfU6+F+pfHyf+iW+tYbh1ONx0STw3ukkWeroVrIDCya/y2xfhhQkYEw7xdcDGf0vUV5cXTufNNT4Cv4AHxLbFhgUAu3s4CbmsDvAR1Ajz4q35X12QfsaFwLTXsjStOYGEmlponKU4ml
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:976

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Discovery

          System Information Discovery

          1
          T1082

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\fkmaku.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • C:\Users\Admin\AppData\Local\Temp\fkmaku.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • C:\Users\Admin\AppData\Local\Temp\tmp228F.tmp.bat
            Filesize

            152B

            MD5

            68251cc447103e4a8681e275c5ad1aa1

            SHA1

            ce6b8eeba3cd6b8c501c822fd6c28fd848392035

            SHA256

            6e76777fff39df61cab27877956e442a14556a4ed7dcae6250fbf082e01929ff

            SHA512

            a4934f38c7672ac49a39e168d2820cca6eadf4964f7c42fc38b1dc1dea682e8affc75f8f7fb0afedacc5fcb3e97e77b06641f109893ae21d5b77ce962619a63c

          • C:\Users\Admin\AppData\Roaming\Explorer.exe
            Filesize

            64KB

            MD5

            c75c0d8d46633692c979eb6fbd26094e

            SHA1

            b3945681b32a90f00ef2fd2af2eb4f5d4208c75d

            SHA256

            bbd275db0ec38e99c088654b042b682c428ba644969ef08f1d9657052f9b1393

            SHA512

            5d4ecd6c3fee2cf25cdfc4c6abbb389b261016b805ab1f6c4f0918143df6b02f0647d6ba87b1169ef0040ea9afd0dd22ce2612e2600b48e6dd9ffd7be99a1067

          • C:\Users\Admin\AppData\Roaming\Explorer.exe
            Filesize

            64KB

            MD5

            c75c0d8d46633692c979eb6fbd26094e

            SHA1

            b3945681b32a90f00ef2fd2af2eb4f5d4208c75d

            SHA256

            bbd275db0ec38e99c088654b042b682c428ba644969ef08f1d9657052f9b1393

            SHA512

            5d4ecd6c3fee2cf25cdfc4c6abbb389b261016b805ab1f6c4f0918143df6b02f0647d6ba87b1169ef0040ea9afd0dd22ce2612e2600b48e6dd9ffd7be99a1067

          • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • C:\Windows\system32\drivers\etc\hosts
            Filesize

            892B

            MD5

            ffe7c3baa6bda096898ad55fc2274b4f

            SHA1

            810e398f090b4536d46e397c85548eea39f37f10

            SHA256

            6f22705db77b5bbe26ad059bc3ba99f3837e18ed53b8dadbe32fbbabdf9337f1

            SHA512

            81af4ce85a0f9f483ca43c5ca2d73cbd714f4a6716ddd8dba25c6a01b2310710bf131e7650f6a9785bef83497c7994ea29d907c47627d6c776e7e5e108f9c34a

          • \Users\Admin\AppData\Local\Temp\fkmaku.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • \Users\Admin\AppData\Roaming\Explorer.exe
            Filesize

            64KB

            MD5

            c75c0d8d46633692c979eb6fbd26094e

            SHA1

            b3945681b32a90f00ef2fd2af2eb4f5d4208c75d

            SHA256

            bbd275db0ec38e99c088654b042b682c428ba644969ef08f1d9657052f9b1393

            SHA512

            5d4ecd6c3fee2cf25cdfc4c6abbb389b261016b805ab1f6c4f0918143df6b02f0647d6ba87b1169ef0040ea9afd0dd22ce2612e2600b48e6dd9ffd7be99a1067

          • \Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            Filesize

            4.1MB

            MD5

            85003917e913d597b23b45905f42834e

            SHA1

            62182aa2983dbc8653d7dd8639daf40f2e381c30

            SHA256

            427c9eb0e789ed6175fb3127d61a551785f2e09b3d2672f253600b66e3b76a4e

            SHA512

            ebdb5f9a819adea1c29057930ca47187120e207d155831dcab7ab9f816e1c992a14698f4e068d57edf23d66ed746eeb1e60fc623ed2174c116ba1fde2ef9dd48

          • memory/364-98-0x0000000000000000-mapping.dmp
          • memory/556-82-0x0000000000000000-mapping.dmp
          • memory/668-68-0x0000000000000000-mapping.dmp
          • memory/828-71-0x000000006E4E0000-0x000000006EA8B000-memory.dmp
            Filesize

            5.7MB

          • memory/828-69-0x0000000000000000-mapping.dmp
          • memory/828-76-0x000000006E4E0000-0x000000006EA8B000-memory.dmp
            Filesize

            5.7MB

          • memory/856-78-0x000007FEFB5D1000-0x000007FEFB5D3000-memory.dmp
            Filesize

            8KB

          • memory/856-74-0x0000000000000000-mapping.dmp
          • memory/856-77-0x000000013F6B0000-0x000000013FACC000-memory.dmp
            Filesize

            4.1MB

          • memory/948-79-0x0000000000000000-mapping.dmp
          • memory/976-109-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-127-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-134-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-133-0x0000000000000000-0x0000000001000000-memory.dmp
            Filesize

            16.0MB

          • memory/976-132-0x0000000000260000-0x0000000000280000-memory.dmp
            Filesize

            128KB

          • memory/976-131-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-130-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-113-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-111-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-128-0x000000014036EAC4-mapping.dmp
          • memory/976-119-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-118-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-125-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-108-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-124-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-123-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-121-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-115-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/976-117-0x0000000140000000-0x0000000140809000-memory.dmp
            Filesize

            8.0MB

          • memory/1076-56-0x0000000000000000-mapping.dmp
          • memory/1112-96-0x0000000000000000-mapping.dmp
          • memory/1308-87-0x0000000000000000-mapping.dmp
          • memory/1332-94-0x000000013FC00000-0x000000014001C000-memory.dmp
            Filesize

            4.1MB

          • memory/1332-102-0x0000000000190000-0x0000000000196000-memory.dmp
            Filesize

            24KB

          • memory/1332-91-0x0000000000000000-mapping.dmp
          • memory/1336-55-0x0000000074B51000-0x0000000074B53000-memory.dmp
            Filesize

            8KB

          • memory/1336-54-0x0000000000230000-0x0000000000246000-memory.dmp
            Filesize

            88KB

          • memory/1336-85-0x0000000000000000-mapping.dmp
          • memory/1464-84-0x0000000000000000-mapping.dmp
          • memory/1540-103-0x0000000000060000-0x0000000000067000-memory.dmp
            Filesize

            28KB

          • memory/1540-105-0x0000000000000000-mapping.dmp
          • memory/1540-106-0x0000000000060000-0x0000000000067000-memory.dmp
            Filesize

            28KB

          • memory/1540-107-0x0000000001B30000-0x0000000001B36000-memory.dmp
            Filesize

            24KB

          • memory/1568-89-0x0000000000000000-mapping.dmp
          • memory/1592-101-0x0000000000000000-mapping.dmp
          • memory/1704-81-0x0000000000000000-mapping.dmp
          • memory/1716-100-0x0000000000000000-mapping.dmp
          • memory/1732-65-0x0000000000D40000-0x0000000000D56000-memory.dmp
            Filesize

            88KB

          • memory/1732-67-0x0000000000C20000-0x0000000000C2C000-memory.dmp
            Filesize

            48KB

          • memory/1732-63-0x0000000000000000-mapping.dmp
          • memory/1812-86-0x0000000000000000-mapping.dmp
          • memory/1824-99-0x0000000000000000-mapping.dmp
          • memory/1828-80-0x0000000000000000-mapping.dmp
          • memory/1988-59-0x0000000000000000-mapping.dmp
          • memory/1996-60-0x0000000000000000-mapping.dmp
          • memory/2000-83-0x0000000000000000-mapping.dmp
          • memory/2016-57-0x0000000000000000-mapping.dmp
          • memory/2036-88-0x0000000000000000-mapping.dmp