Overview
overview
10Static
static
10AfMaRTHbXDQeEqK.exe
windows7-x64
1AfMaRTHbXDQeEqK.exe
windows10-2004-x64
1AnZNZkqSCLtCdJP.exe
windows7-x64
10AnZNZkqSCLtCdJP.exe
windows10-2004-x64
10AwHQZpWsBXMfKoP.exe
windows7-x64
1AwHQZpWsBXMfKoP.exe
windows10-2004-x64
1AxStJPBXbsGYNCc.exe
windows7-x64
10AxStJPBXbsGYNCc.exe
windows10-2004-x64
10BcJRFxiQTFDdmBX.exe
windows7-x64
10BcJRFxiQTFDdmBX.exe
windows10-2004-x64
10BeRWDywBMMSobQZ.exe
windows7-x64
10BeRWDywBMMSobQZ.exe
windows10-2004-x64
10BgNDTadHLDiJwMQ.exe
windows7-x64
10BgNDTadHLDiJwMQ.exe
windows10-2004-x64
10BjWXPytPSJRdiLA.exe
windows7-x64
1BjWXPytPSJRdiLA.exe
windows10-2004-x64
7BmGjLSDwCWXaZqK.exe
windows7-x64
10BmGjLSDwCWXaZqK.exe
windows10-2004-x64
10CfGQYemJHRdTnFG.exe
windows7-x64
10CfGQYemJHRdTnFG.exe
windows10-2004-x64
10CgENMjeJGCZcdAF.exe
windows7-x64
10CgENMjeJGCZcdAF.exe
windows10-2004-x64
10CjYrWNZyEcMBBMa.exe
windows7-x64
8CjYrWNZyEcMBBMa.exe
windows10-2004-x64
8CsFbNASzLBKdkHR.exe
windows7-x64
10CsFbNASzLBKdkHR.exe
windows10-2004-x64
10DaGdSGFqZFBbLpA.exe
windows7-x64
10DaGdSGFqZFBbLpA.exe
windows10-2004-x64
10DcDJLimAFTYswMQ.exe
windows7-x64
10DcDJLimAFTYswMQ.exe
windows10-2004-x64
10aCRAEzePNKKgoZZ.exe
windows7-x64
10aCRAEzePNKKgoZZ.exe
windows10-2004-x64
10Analysis
-
max time kernel
177s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2022 06:32
Static task
static1
Behavioral task
behavioral1
Sample
AfMaRTHbXDQeEqK.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AfMaRTHbXDQeEqK.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
AnZNZkqSCLtCdJP.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AnZNZkqSCLtCdJP.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AwHQZpWsBXMfKoP.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AwHQZpWsBXMfKoP.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
AxStJPBXbsGYNCc.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AxStJPBXbsGYNCc.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
BcJRFxiQTFDdmBX.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
BcJRFxiQTFDdmBX.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
BeRWDywBMMSobQZ.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
BeRWDywBMMSobQZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
BgNDTadHLDiJwMQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
BgNDTadHLDiJwMQ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
BjWXPytPSJRdiLA.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
BjWXPytPSJRdiLA.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
BmGjLSDwCWXaZqK.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
BmGjLSDwCWXaZqK.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
CfGQYemJHRdTnFG.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
CfGQYemJHRdTnFG.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
CgENMjeJGCZcdAF.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
CgENMjeJGCZcdAF.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
CjYrWNZyEcMBBMa.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
CjYrWNZyEcMBBMa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
CsFbNASzLBKdkHR.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
CsFbNASzLBKdkHR.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
DaGdSGFqZFBbLpA.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
DaGdSGFqZFBbLpA.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
DcDJLimAFTYswMQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
DcDJLimAFTYswMQ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
aCRAEzePNKKgoZZ.exe
Resource
win7-20220812-en
General
-
Target
BcJRFxiQTFDdmBX.exe
-
Size
48KB
-
MD5
a671a69d4e3f7425bf163eae052250ff
-
SHA1
80c47eae696348b607f5f54ab3101c10c64192ce
-
SHA256
447f95e2299fbab8e30669f1fd5c71b2e69499e25adae3373093c0317f53fdc5
-
SHA512
527a88921d628ffbe1cfbe21f204e3dbf3cea026129c6a9e3d713a82b9c9e6f75155f5da4bfe2f14845d6542cdbe129fa72214b028c4fdc397456d33f789a85b
-
SSDEEP
768:mbRJZBILLWQ9+jiwtelDSN+iV08Ybygecb+zqBEmyIvEgK/JbZVc6KN:mbRq9wtKDs4zb1pu9xInkJbZVclN
Malware Config
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral10/memory/2856-132-0x00000000006B0000-0x00000000006C2000-memory.dmp asyncrat behavioral10/files/0x000d000000022f68-141.dat asyncrat behavioral10/files/0x000d000000022f68-142.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1256 Windows Service .exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation BcJRFxiQTFDdmBX.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4852 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4340 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe 2856 BcJRFxiQTFDdmBX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 BcJRFxiQTFDdmBX.exe Token: SeDebugPrivilege 1256 Windows Service .exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3552 2856 BcJRFxiQTFDdmBX.exe 81 PID 2856 wrote to memory of 3552 2856 BcJRFxiQTFDdmBX.exe 81 PID 2856 wrote to memory of 4904 2856 BcJRFxiQTFDdmBX.exe 83 PID 2856 wrote to memory of 4904 2856 BcJRFxiQTFDdmBX.exe 83 PID 3552 wrote to memory of 4852 3552 cmd.exe 85 PID 3552 wrote to memory of 4852 3552 cmd.exe 85 PID 4904 wrote to memory of 4340 4904 cmd.exe 86 PID 4904 wrote to memory of 4340 4904 cmd.exe 86 PID 4904 wrote to memory of 1256 4904 cmd.exe 87 PID 4904 wrote to memory of 1256 4904 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\BcJRFxiQTFDdmBX.exe"C:\Users\Admin\AppData\Local\Temp\BcJRFxiQTFDdmBX.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows Service " /tr '"C:\Users\Admin\AppData\Roaming\Windows Service .exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows Service " /tr '"C:\Users\Admin\AppData\Roaming\Windows Service .exe"'3⤵
- Creates scheduled task(s)
PID:4852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp75CC.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4340
-
-
C:\Users\Admin\AppData\Roaming\Windows Service .exe"C:\Users\Admin\AppData\Roaming\Windows Service .exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD53a865c5450718d8c5d1f755f18470ed2
SHA187448774a0259d06cbdcc26a6356dcc1a9df048c
SHA256708ed4d17c3fb8e5dbf99508cd7ab1598ec4daaa6bf21db0a816c41386a1f3e6
SHA512ee2cb5c7c50c4ab5d3502b33d003f7c88510dde6d55e5b690efdc7ff51db162777675cf72724f36f7f6d6830d3c1873a73bf7706230f40ee9b7b4babda4e6f7b
-
Filesize
48KB
MD5a671a69d4e3f7425bf163eae052250ff
SHA180c47eae696348b607f5f54ab3101c10c64192ce
SHA256447f95e2299fbab8e30669f1fd5c71b2e69499e25adae3373093c0317f53fdc5
SHA512527a88921d628ffbe1cfbe21f204e3dbf3cea026129c6a9e3d713a82b9c9e6f75155f5da4bfe2f14845d6542cdbe129fa72214b028c4fdc397456d33f789a85b
-
Filesize
48KB
MD5a671a69d4e3f7425bf163eae052250ff
SHA180c47eae696348b607f5f54ab3101c10c64192ce
SHA256447f95e2299fbab8e30669f1fd5c71b2e69499e25adae3373093c0317f53fdc5
SHA512527a88921d628ffbe1cfbe21f204e3dbf3cea026129c6a9e3d713a82b9c9e6f75155f5da4bfe2f14845d6542cdbe129fa72214b028c4fdc397456d33f789a85b