Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2022 09:54

General

  • Target

    ad8002665212315615652315615dd45165456456f46456a46565465456a5641321564ca546546ff465426516516542564678.exe

  • Size

    672KB

  • MD5

    c15c06202479856ab3f043062ba19982

  • SHA1

    7331fb30be702664f12c1b259d836526e8c4eaee

  • SHA256

    2c43108365bff7cfaa206e1232b973ec0028fe1f5ab7b0c64154cd27bc9d193e

  • SHA512

    2bb3e92e8786e22454a6a206f7fb90ecf37352f3e0f93dcaa3329b6865474ea1bd4f187390fa579addc68fddb2630a73e4bd918e5486f15963d40440af442445

  • SSDEEP

    12288:GzpFvtttDZ0k4A1A+42wY99DgFA1acULgwpa6O8QlaIPbSf8CGnYXl:GFtth11AguFYHmy8QMsSf8GXl

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8002665212315615652315615dd45165456456f46456a46565465456a5641321564ca546546ff465426516516542564678.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8002665212315615652315615dd45165456456f46456a46565465456a5641321564ca546546ff465426516516542564678.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4604
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:3392

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3392-142-0x0000000000000000-mapping.dmp
    • memory/3392-143-0x0000000000400000-0x000000000041A000-memory.dmp
      Filesize

      104KB

    • memory/4536-132-0x00000000006E0000-0x000000000078C000-memory.dmp
      Filesize

      688KB

    • memory/4536-133-0x0000000005990000-0x00000000059B2000-memory.dmp
      Filesize

      136KB

    • memory/4604-134-0x0000000000000000-mapping.dmp
    • memory/4604-135-0x0000000002FF0000-0x0000000003026000-memory.dmp
      Filesize

      216KB

    • memory/4604-136-0x0000000005870000-0x0000000005E98000-memory.dmp
      Filesize

      6.2MB

    • memory/4604-137-0x0000000005680000-0x00000000056E6000-memory.dmp
      Filesize

      408KB

    • memory/4604-138-0x00000000056F0000-0x0000000005756000-memory.dmp
      Filesize

      408KB

    • memory/4604-139-0x0000000006620000-0x000000000663E000-memory.dmp
      Filesize

      120KB

    • memory/4604-140-0x0000000007C60000-0x00000000082DA000-memory.dmp
      Filesize

      6.5MB

    • memory/4604-141-0x0000000006B30000-0x0000000006B4A000-memory.dmp
      Filesize

      104KB