Analysis
-
max time kernel
91s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-07-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
759eb01f8687aa4ab519ce0b8ada22d7.exe
Resource
win7-20220414-en
General
-
Target
759eb01f8687aa4ab519ce0b8ada22d7.exe
-
Size
560KB
-
MD5
759eb01f8687aa4ab519ce0b8ada22d7
-
SHA1
80086dd4bd562df870ed9556248a0a46177e63d7
-
SHA256
0fbd0deb8891b8836c9987f79c0dcf7383ace21dcd7ee8ffcfdf609311af7808
-
SHA512
2ac4cc01afba0ba62db65763f5f3fe9ecfd2e83dbe5a28082d2d61cce92ef37f08e5c0b6f2d7769ff6309f805a3385cf1b4f968ff22e8632b76af3098ee00dc0
Malware Config
Signatures
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
759eb01f8687aa4ab519ce0b8ada22d7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 759eb01f8687aa4ab519ce0b8ada22d7.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
759eb01f8687aa4ab519ce0b8ada22d7.exedescription pid process target process PID 4284 set thread context of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1132 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exe759eb01f8687aa4ab519ce0b8ada22d7.exepid process 4488 powershell.exe 4488 powershell.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe759eb01f8687aa4ab519ce0b8ada22d7.exe759eb01f8687aa4ab519ce0b8ada22d7.exedescription pid process Token: SeDebugPrivilege 4488 powershell.exe Token: SeDebugPrivilege 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe Token: SeDebugPrivilege 4564 759eb01f8687aa4ab519ce0b8ada22d7.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
759eb01f8687aa4ab519ce0b8ada22d7.exe759eb01f8687aa4ab519ce0b8ada22d7.execmd.exedescription pid process target process PID 4284 wrote to memory of 4488 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe powershell.exe PID 4284 wrote to memory of 4488 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe powershell.exe PID 4284 wrote to memory of 4488 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe powershell.exe PID 4284 wrote to memory of 4604 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4604 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4604 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4284 wrote to memory of 4564 4284 759eb01f8687aa4ab519ce0b8ada22d7.exe 759eb01f8687aa4ab519ce0b8ada22d7.exe PID 4564 wrote to memory of 912 4564 759eb01f8687aa4ab519ce0b8ada22d7.exe cmd.exe PID 4564 wrote to memory of 912 4564 759eb01f8687aa4ab519ce0b8ada22d7.exe cmd.exe PID 4564 wrote to memory of 912 4564 759eb01f8687aa4ab519ce0b8ada22d7.exe cmd.exe PID 912 wrote to memory of 1132 912 cmd.exe timeout.exe PID 912 wrote to memory of 1132 912 cmd.exe timeout.exe PID 912 wrote to memory of 1132 912 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exe"C:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exeC:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exeC:\Users\Admin\AppData\Local\Temp\759eb01f8687aa4ab519ce0b8ada22d7.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6BD9.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\759eb01f8687aa4ab519ce0b8ada22d7.exe.logFilesize
897B
MD5cf251dc9d6217669420cb56ddcc8c522
SHA13fcbcdbe8b9eda10ce3e86729851ba4b0e20c6e6
SHA2560197375e8413bc8b68ae7b0acad3c0314ebf3317f673ea9d187363305e622221
SHA512c89c7609d4a647fc1f6b951f376ba5fc43f610dfedd0cab2368d7bfba732ab4defcaef11f218bcda9d76488b1946b74416e021f84c54627b22bdec0e0b5e5ec8
-
C:\Users\Admin\AppData\Local\Temp\tmp6BD9.tmp.batFilesize
184B
MD51383b9c41f52e9b12b6f59658a0f3de0
SHA100d12c66c7c2eab20d0e81f0438baa27a44419a1
SHA256d2065d412c8b3a2f6cd1ff2d6ee8cb7500a1240971b6ab814131a4f1aae71ec8
SHA5122edc57eaa39afea956af215a8fe4727754f01d96015895f3fd1125d8305523ff33104cc891bae1a6717b3b3f66927097849c75abe3656014a4f105e4697bcdcc
-
memory/912-149-0x0000000000000000-mapping.dmp
-
memory/1132-151-0x0000000000000000-mapping.dmp
-
memory/4284-140-0x0000000005A50000-0x0000000005AE2000-memory.dmpFilesize
584KB
-
memory/4284-130-0x0000000000F80000-0x0000000001012000-memory.dmpFilesize
584KB
-
memory/4284-141-0x0000000006FC0000-0x0000000007564000-memory.dmpFilesize
5.6MB
-
memory/4488-133-0x0000000005430000-0x0000000005A58000-memory.dmpFilesize
6.2MB
-
memory/4488-136-0x0000000005C70000-0x0000000005CD6000-memory.dmpFilesize
408KB
-
memory/4488-137-0x00000000062A0000-0x00000000062BE000-memory.dmpFilesize
120KB
-
memory/4488-138-0x00000000078F0000-0x0000000007F6A000-memory.dmpFilesize
6.5MB
-
memory/4488-139-0x0000000006790000-0x00000000067AA000-memory.dmpFilesize
104KB
-
memory/4488-131-0x0000000000000000-mapping.dmp
-
memory/4488-135-0x0000000005AD0000-0x0000000005B36000-memory.dmpFilesize
408KB
-
memory/4488-132-0x0000000002CB0000-0x0000000002CE6000-memory.dmpFilesize
216KB
-
memory/4488-134-0x00000000053F0000-0x0000000005412000-memory.dmpFilesize
136KB
-
memory/4564-143-0x0000000000000000-mapping.dmp
-
memory/4564-147-0x0000000007280000-0x00000000072F6000-memory.dmpFilesize
472KB
-
memory/4564-148-0x0000000007260000-0x000000000727E000-memory.dmpFilesize
120KB
-
memory/4564-146-0x0000000005D70000-0x0000000005E0C000-memory.dmpFilesize
624KB
-
memory/4564-144-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4604-142-0x0000000000000000-mapping.dmp