Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 03:48
Static task
static1
Behavioral task
behavioral1
Sample
4029013#.exe
Resource
win7-20220812-en
General
-
Target
4029013#.exe
-
Size
300.0MB
-
MD5
41308dae88480a4eaf61b36767990bbe
-
SHA1
a347f3eb607df4c47b9473818866bcad6aef4e96
-
SHA256
190324c758fe4e21f2254d10bc9871b5e8a2e0f063a0b49f1680b3ee9f8da519
-
SHA512
ee0812562d7f0f16ea75ccc236ac85c986c47ed52fc75ffb8d1a21d9c62cb90855963d2678dfc01345e97f5435d320d0ba982d82f1d7395d066b843e49479c42
-
SSDEEP
3072:ZuDu8y65Hc4/+683JZbqaZ75yEzHX7NXjPP8shYd0CwbI+hRx:ZuDu8y65Hc4SrbqXEz37BjzugbIg
Malware Config
Extracted
asyncrat
Venom RAT 5.0.4
MAY 17
paris-comrademay17.duckdns.org:25045
kjauwydefagvrcku64y
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1288-63-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1288-62-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1288-64-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1288-65-0x00000000004109BE-mapping.dmp asyncrat behavioral1/memory/1288-69-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1288-67-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
pmfr.exepid process 1116 pmfr.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
4029013#.exedescription pid process target process PID 2000 set thread context of 1288 2000 4029013#.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1312 schtasks.exe 1700 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 1288 vbc.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
4029013#.execmd.exetaskeng.exepmfr.execmd.exedescription pid process target process PID 2000 wrote to memory of 1488 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1488 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1488 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1488 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1492 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1492 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1492 2000 4029013#.exe cmd.exe PID 2000 wrote to memory of 1492 2000 4029013#.exe cmd.exe PID 1488 wrote to memory of 1312 1488 cmd.exe schtasks.exe PID 1488 wrote to memory of 1312 1488 cmd.exe schtasks.exe PID 1488 wrote to memory of 1312 1488 cmd.exe schtasks.exe PID 1488 wrote to memory of 1312 1488 cmd.exe schtasks.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 2000 wrote to memory of 1288 2000 4029013#.exe vbc.exe PID 1104 wrote to memory of 1116 1104 taskeng.exe pmfr.exe PID 1104 wrote to memory of 1116 1104 taskeng.exe pmfr.exe PID 1104 wrote to memory of 1116 1104 taskeng.exe pmfr.exe PID 1104 wrote to memory of 1116 1104 taskeng.exe pmfr.exe PID 1116 wrote to memory of 1512 1116 pmfr.exe cmd.exe PID 1116 wrote to memory of 1512 1116 pmfr.exe cmd.exe PID 1116 wrote to memory of 1512 1116 pmfr.exe cmd.exe PID 1116 wrote to memory of 1512 1116 pmfr.exe cmd.exe PID 1512 wrote to memory of 1700 1512 cmd.exe schtasks.exe PID 1512 wrote to memory of 1700 1512 cmd.exe schtasks.exe PID 1512 wrote to memory of 1700 1512 cmd.exe schtasks.exe PID 1512 wrote to memory of 1700 1512 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4029013#.exe"C:\Users\Admin\AppData\Local\Temp\4029013#.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\pmfr.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\pmfr.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\4029013#.exe" "C:\Users\Admin\AppData\Roaming\pmfr.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {705D7806-5FF1-488C-BE95-3D61DB401813} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\pmfr.exeC:\Users\Admin\AppData\Roaming\pmfr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\pmfr.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\Admin\AppData\Roaming\pmfr.exe'" /f4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\pmfr.exeFilesize
266.2MB
MD50953e6106e5e369e6e96ac0d4bd67365
SHA1a5531f314db75cb7f9a8f80dd9a642aca57a235e
SHA256f9b54a6d4f278e9c72e4bca51f96e750eb22c40d76c838d2eb64e971a6035c9d
SHA512988d92eb38c304b72fe543648d8215258ff2716886218eb24064008136f37bbea49a888bec6c5ef4b013cb24fa5273adef382095f629da4533a8fff1cf0bfec4
-
C:\Users\Admin\AppData\Roaming\pmfr.exeFilesize
271.1MB
MD5e0eafcf5d734e000c22201726cb6c3be
SHA1b58208464dbc02507b9a9a540678f10a8a031a49
SHA25623462ed4b3d4648b918ce2cdae47934a9882d2320fe914f110b93d253a622dae
SHA5123b452f64ba3bdd32e87146e51acc9e448dc47549448f32160c4419c96e5a1868b4b8fe220dc5aec6bd9e9b3665fbd053c78931751a3bb824302d1ed2de38a81d
-
memory/1116-74-0x0000000000B90000-0x0000000000BC2000-memory.dmpFilesize
200KB
-
memory/1116-72-0x0000000000000000-mapping.dmp
-
memory/1288-67-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-69-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-60-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-63-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-62-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-64-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1288-65-0x00000000004109BE-mapping.dmp
-
memory/1288-59-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1312-58-0x0000000000000000-mapping.dmp
-
memory/1488-56-0x0000000000000000-mapping.dmp
-
memory/1492-57-0x0000000000000000-mapping.dmp
-
memory/1512-76-0x0000000000000000-mapping.dmp
-
memory/1700-77-0x0000000000000000-mapping.dmp
-
memory/2000-54-0x0000000000E30000-0x0000000000E62000-memory.dmpFilesize
200KB
-
memory/2000-55-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB