Analysis

  • max time kernel
    114s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2022 14:23

General

  • Target

    tmp.exe

  • Size

    1018KB

  • MD5

    f58357e2f32909d85790128c9f6d08c0

  • SHA1

    b75dea10a3f9ebcce95c2dbf9d20a98fe3c5bd78

  • SHA256

    462342db316acd9578f80e1b80471237fecc9479d2d70f7f413b1b47cd302400

  • SHA512

    52aec13d3af40f0396a31ed278f3d243bf3eb6bebaac425bd8cc050cf399e47eb1e6ec851eb024c56d4ccc1d76d958aa2ba87ec94e2a7e72c9bf6484cdf949d8

  • SSDEEP

    12288:ithx+HhW51Ur3EUfGTLX+fw0aSdpjRAvqYzlJLO/xbf:aD4h/jtfw0PmzlJLO/hf

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Async RAT payload 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1916
          • C:\Users\Admin\AppData\Local\Temp\aajrpy.exe
            "C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              6⤵
                PID:1616
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe
              "C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1188
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1136
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                6⤵
                  PID:1720
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  6⤵
                  • Suspicious behavior: AddClipboardFormatListener
                  PID:832
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"' & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:468
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"'
              4⤵
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:240
              • C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe
                "C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1264
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {24E1F50A-1482-46AA-95EF-CBFB9BEB3743} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:S4U:
        1⤵
          PID:1620
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
            2⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1012

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Winlogon Helper DLL

        1
        T1004

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\aajrpy.exe
          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Local\Temp\aajrpy.exe
          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe
          Filesize

          1.0MB

          MD5

          7217f672995942607eba0cd4fb1bb117

          SHA1

          c0079cdb09360d3e2e9f449035f38c9dad5cad1d

          SHA256

          ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

          SHA512

          d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

        • C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe
          Filesize

          1.0MB

          MD5

          7217f672995942607eba0cd4fb1bb117

          SHA1

          c0079cdb09360d3e2e9f449035f38c9dad5cad1d

          SHA256

          ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

          SHA512

          d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

        • C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe
          Filesize

          493KB

          MD5

          acba20ad390f3688738f688f262adf63

          SHA1

          b732d2ffafa3b6237c3fe40d3172497bf556df6e

          SHA256

          1b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877

          SHA512

          6b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14

        • C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe
          Filesize

          493KB

          MD5

          acba20ad390f3688738f688f262adf63

          SHA1

          b732d2ffafa3b6237c3fe40d3172497bf556df6e

          SHA256

          1b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877

          SHA512

          6b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          Filesize

          7KB

          MD5

          51678134d052bcbc59838b57243e1f06

          SHA1

          b5a94ddb4ee7d38f37280e88ec8f7015ecda089d

          SHA256

          338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86

          SHA512

          85d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          Filesize

          7KB

          MD5

          51678134d052bcbc59838b57243e1f06

          SHA1

          b5a94ddb4ee7d38f37280e88ec8f7015ecda089d

          SHA256

          338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86

          SHA512

          85d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
          Filesize

          7KB

          MD5

          51678134d052bcbc59838b57243e1f06

          SHA1

          b5a94ddb4ee7d38f37280e88ec8f7015ecda089d

          SHA256

          338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86

          SHA512

          85d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986

        • \Users\Admin\AppData\Local\Temp\aajrpy.exe
          Filesize

          828KB

          MD5

          494969d84ee004227da4051403cbc098

          SHA1

          befd216439b68c83899476ea7bf5c7eff025bdc6

          SHA256

          c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

          SHA512

          ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

        • \Users\Admin\AppData\Local\Temp\mnzjfp.exe
          Filesize

          1.0MB

          MD5

          7217f672995942607eba0cd4fb1bb117

          SHA1

          c0079cdb09360d3e2e9f449035f38c9dad5cad1d

          SHA256

          ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

          SHA512

          d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

        • \Users\Admin\AppData\Local\Temp\rlfhwc.exe
          Filesize

          493KB

          MD5

          acba20ad390f3688738f688f262adf63

          SHA1

          b732d2ffafa3b6237c3fe40d3172497bf556df6e

          SHA256

          1b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877

          SHA512

          6b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14

        • memory/240-116-0x0000000000000000-mapping.dmp
        • memory/240-126-0x000000006D4E0000-0x000000006DA8B000-memory.dmp
          Filesize

          5.7MB

        • memory/468-115-0x0000000000000000-mapping.dmp
        • memory/532-56-0x0000000075091000-0x0000000075093000-memory.dmp
          Filesize

          8KB

        • memory/532-57-0x00000000010B0000-0x0000000001142000-memory.dmp
          Filesize

          584KB

        • memory/532-54-0x0000000001270000-0x0000000001374000-memory.dmp
          Filesize

          1.0MB

        • memory/532-55-0x0000000000A00000-0x0000000000AAC000-memory.dmp
          Filesize

          688KB

        • memory/832-136-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-142-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-134-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-132-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-131-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-137-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/832-138-0x000000000040504E-mapping.dmp
        • memory/832-140-0x0000000000400000-0x0000000000436000-memory.dmp
          Filesize

          216KB

        • memory/1012-146-0x000007FEFB751000-0x000007FEFB753000-memory.dmp
          Filesize

          8KB

        • memory/1012-150-0x0000000000FAB000-0x0000000000FCA000-memory.dmp
          Filesize

          124KB

        • memory/1012-145-0x0000000000000000-mapping.dmp
        • memory/1012-152-0x0000000000FAB000-0x0000000000FCA000-memory.dmp
          Filesize

          124KB

        • memory/1012-147-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmp
          Filesize

          10.1MB

        • memory/1012-151-0x0000000000FA4000-0x0000000000FA7000-memory.dmp
          Filesize

          12KB

        • memory/1012-149-0x0000000000FA4000-0x0000000000FA7000-memory.dmp
          Filesize

          12KB

        • memory/1012-148-0x000007FEF2870000-0x000007FEF33CD000-memory.dmp
          Filesize

          11.4MB

        • memory/1136-111-0x0000000000000000-mapping.dmp
        • memory/1136-120-0x000000006D4E0000-0x000000006DA8B000-memory.dmp
          Filesize

          5.7MB

        • memory/1136-114-0x000000006D4E0000-0x000000006DA8B000-memory.dmp
          Filesize

          5.7MB

        • memory/1188-109-0x0000000000B60000-0x0000000000BA8000-memory.dmp
          Filesize

          288KB

        • memory/1188-104-0x0000000000000000-mapping.dmp
        • memory/1188-107-0x0000000000C80000-0x0000000000D92000-memory.dmp
          Filesize

          1.1MB

        • memory/1188-108-0x00000000005C0000-0x0000000000676000-memory.dmp
          Filesize

          728KB

        • memory/1264-125-0x0000000000440000-0x00000000004EE000-memory.dmp
          Filesize

          696KB

        • memory/1264-144-0x0000000001090000-0x00000000010E4000-memory.dmp
          Filesize

          336KB

        • memory/1264-130-0x0000000000CA0000-0x0000000000CEC000-memory.dmp
          Filesize

          304KB

        • memory/1264-129-0x0000000000770000-0x00000000007C4000-memory.dmp
          Filesize

          336KB

        • memory/1264-127-0x0000000000690000-0x00000000006E6000-memory.dmp
          Filesize

          344KB

        • memory/1264-124-0x0000000001210000-0x0000000001292000-memory.dmp
          Filesize

          520KB

        • memory/1264-122-0x0000000000000000-mapping.dmp
        • memory/1608-97-0x0000000000000000-mapping.dmp
        • memory/1616-92-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-90-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-89-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-95-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-87-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-85-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-83-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-96-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-82-0x0000000140000000-0x00000001400D9000-memory.dmp
          Filesize

          868KB

        • memory/1616-93-0x0000000140095CF4-mapping.dmp
        • memory/1644-71-0x0000000000000000-mapping.dmp
        • memory/1740-106-0x000000006E320000-0x000000006E8CB000-memory.dmp
          Filesize

          5.7MB

        • memory/1740-101-0x000000006E320000-0x000000006E8CB000-memory.dmp
          Filesize

          5.7MB

        • memory/1740-98-0x0000000000000000-mapping.dmp
        • memory/1892-80-0x000000013F4F0000-0x000000013F5C2000-memory.dmp
          Filesize

          840KB

        • memory/1892-77-0x0000000000000000-mapping.dmp
        • memory/1892-81-0x000000001A8C0000-0x000000001A984000-memory.dmp
          Filesize

          784KB

        • memory/1916-74-0x000000006E5D0000-0x000000006EB7B000-memory.dmp
          Filesize

          5.7MB

        • memory/1916-72-0x0000000000000000-mapping.dmp
        • memory/1916-79-0x000000006E5D0000-0x000000006EB7B000-memory.dmp
          Filesize

          5.7MB

        • memory/1988-70-0x0000000000540000-0x000000000054C000-memory.dmp
          Filesize

          48KB

        • memory/1988-68-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-66-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-64-0x000000000040C79E-mapping.dmp
        • memory/1988-63-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-61-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-62-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-59-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB

        • memory/1988-58-0x0000000000400000-0x0000000000412000-memory.dmp
          Filesize

          72KB