Analysis

  • max time kernel
    79s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2022 08:18

General

  • Target

    SKM-2000012.exe

  • Size

    16KB

  • MD5

    0320bf3e8314fa2f5f4d78c8a69d5aef

  • SHA1

    3e158ac1149277ac5afc3937644fc3e9b48a2c26

  • SHA256

    dea0baa27b4aec785704292890f0c33261fbf51e1cd857c39f563e36251b6430

  • SHA512

    80e3dc604cdc5963bc9ef6f9b1ec2571fee076ba8726854dc1b1ce2fd4c968497a828b433dbc5ef200cd334db7580ce0899c95e057c172fdcb6e77fd4b25fc15

  • SSDEEP

    192:BINVpJODMlmDJLMl3F8EfqD1Y9HJ2HoaNj4s3n61B2KWW40W6:qLODZLMl3epkHAHvNj4ZaW40W

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe
    "C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1388
    • C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe
      C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe Cj4IARIuMTgwMDUwMjY2MzpBQUhTdVBPVFU5LXRGS2NnOGp3Q21jM0gwNVprQ3pULUZ6QRoKMTg4ODU2Mjg4NA==
      2⤵
      • Accesses Microsoft Outlook profiles
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:344
    • C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe
      C:\Users\Admin\AppData\Local\Temp\SKM-2000012.exe
      2⤵
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:668

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    103b39c88c3e30e2a131ef679945f422

    SHA1

    23bb1a4df0ac43e61287bd89987472021d738af2

    SHA256

    b8610cb54a88f1dd85670d61a9e3beca513d85a8528d4a00e07206704af7e592

    SHA512

    424e6a4e985466ca64f666ddba74afd6fc1355a2221a4d6035a6d51d504fc7ee96ac9b1b8d74cddf00bd5aabf8eca6c8340c786f1f76a947bf2e6ef27955f1d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    05021bc260b079e65fd994bcd090d558

    SHA1

    72a78c7a5e9ab08580d42bed87ec9bb859b11202

    SHA256

    6b79c1dd01c5dd70fdbc6ea1b23ec0fa676d969305ae9ee0298d9feb4afde7e0

    SHA512

    5316562386d1cc27e0203ec4adc8b0d93e7ec72ebf639aef293cb30beb7a239392ec7e4cc1c5f65415a5d5be7ea5e861426631c0ed98681efd67003c4dc9f191

  • memory/344-81-0x0000000000CE0000-0x0000000000D26000-memory.dmp
    Filesize

    280KB

  • memory/344-75-0x0000000004490000-0x000000000457A000-memory.dmp
    Filesize

    936KB

  • memory/344-86-0x0000000004DA0000-0x0000000004DEC000-memory.dmp
    Filesize

    304KB

  • memory/344-83-0x0000000000500000-0x0000000000544000-memory.dmp
    Filesize

    272KB

  • memory/344-73-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-63-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-64-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-66-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-67-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-68-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-71-0x0000000000400000-0x00000000004F2000-memory.dmp
    Filesize

    968KB

  • memory/344-69-0x00000000004EC53E-mapping.dmp
  • memory/668-87-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-79-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-76-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-77-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-89-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-80-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-82-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/668-84-0x00000000004290BE-mapping.dmp
  • memory/1388-60-0x000000006F290000-0x000000006F83B000-memory.dmp
    Filesize

    5.7MB

  • memory/1388-58-0x0000000000000000-mapping.dmp
  • memory/1388-61-0x000000006F290000-0x000000006F83B000-memory.dmp
    Filesize

    5.7MB

  • memory/1388-62-0x000000006F290000-0x000000006F83B000-memory.dmp
    Filesize

    5.7MB

  • memory/1736-54-0x0000000001080000-0x000000000108A000-memory.dmp
    Filesize

    40KB

  • memory/1736-57-0x0000000004E00000-0x0000000004E92000-memory.dmp
    Filesize

    584KB

  • memory/1736-56-0x00000000093C0000-0x0000000009504000-memory.dmp
    Filesize

    1.3MB

  • memory/1736-55-0x0000000075A81000-0x0000000075A83000-memory.dmp
    Filesize

    8KB