Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 17:14
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220718-en
General
-
Target
tmp.exe
-
Size
479KB
-
MD5
4c6b01344809054252095695fe24aa5f
-
SHA1
d1571b19723ebb0def5a71b7d977ef4c5bdb66ab
-
SHA256
b20bdd03ad605edafccbed9cbf281d1fd370116dd07e335fc2f428e9efb2863b
-
SHA512
a26600e8233e90034a3a731246bdc634bc30478ea995c37317ef2e8139200f09446c4b78b500ffec5d7a84045790d0e80d20e4ba58cf28f0e4358f80e1db3af0
Malware Config
Extracted
asyncrat
0.5.7B
Default
secureyourdataarea1.duckdns.org:56390
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection tmp.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4412-136-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
tmp.exetmp.exepid process 3552 tmp.exe 4412 tmp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2280897447-3291712302-3137480060-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tmp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 3552 set thread context of 4412 3552 tmp.exe tmp.exe -
Drops file in Program Files directory 64 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MI391D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe tmp.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe tmp.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MICROS~4.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MIA062~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13163~1.19\MICROS~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe tmp.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MI9C33~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MICROS~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13163~1.19\MICROS~2.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe tmp.exe -
Drops file in Windows directory 1 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\svchost.com tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1784 powershell.exe 1784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tmp.exetmp.exepowershell.exedescription pid process Token: SeDebugPrivilege 3552 tmp.exe Token: SeDebugPrivilege 4412 tmp.exe Token: SeDebugPrivilege 1784 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
tmp.exetmp.exetmp.exedescription pid process target process PID 3196 wrote to memory of 3552 3196 tmp.exe tmp.exe PID 3196 wrote to memory of 3552 3196 tmp.exe tmp.exe PID 3196 wrote to memory of 3552 3196 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 3552 wrote to memory of 4412 3552 tmp.exe tmp.exe PID 4412 wrote to memory of 1784 4412 tmp.exe powershell.exe PID 4412 wrote to memory of 1784 4412 tmp.exe powershell.exe PID 4412 wrote to memory of 1784 4412 tmp.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe03⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD5564716eed1d687a11ed72a316def6481
SHA1c2423fc47318cd25ecfab00cff85179cba4a9e01
SHA256636987560bea08b7ef5fd1886fd9b37e7d56aa7aa3ecb2b5d41129ae9150f615
SHA512052a4405491981896103c1fad4fb3ce36b1a1a0ed21802e1aba58164580b10baef1ea2d8cc1384578a9b67392cf9bb1f9c4d006eca3794178e01457ce42dd761
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715