Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2022 10:23

General

  • Target

    IMG-2983562398092375826583295 CONFIRMACION EXITOSA DE CONSIGNACION A CUENTA DE AHORRO 8723456792385'2.exe

  • Size

    1.3MB

  • MD5

    f466733baafecbcda0e3e270254b6a71

  • SHA1

    0126d0f915000c7870b2ef99a3956b469e5e332b

  • SHA256

    6313da98fb2cb9a244be2831c68da5301bfd60fbdd49293ca74e73d8885a2915

  • SHA512

    5a18e2fcd299b54fe5dd2a9eef0e35855a2b618c18351463f9037d0af901db2b82ae620df2d72f713521ed43965f03979e6235ae38985bebbfaa45773c676bbb

  • SSDEEP

    24576:actJecDFmLiYXccqM8oUS9Ms9l/dJjtPx:actJnDFPYXbqMUkMuLHP

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

pedroalcantaralora09.duckdns.org:1990

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG-2983562398092375826583295 CONFIRMACION EXITOSA DE CONSIGNACION A CUENTA DE AHORRO 8723456792385'2.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG-2983562398092375826583295 CONFIRMACION EXITOSA DE CONSIGNACION A CUENTA DE AHORRO 8723456792385'2.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
        PID:2300

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2300-142-0x0000000000000000-mapping.dmp
    • memory/2300-143-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/2748-134-0x0000000000000000-mapping.dmp
    • memory/2748-135-0x00000000053B0000-0x00000000053E6000-memory.dmp
      Filesize

      216KB

    • memory/2748-136-0x0000000005B70000-0x0000000006198000-memory.dmp
      Filesize

      6.2MB

    • memory/2748-137-0x00000000062B0000-0x0000000006316000-memory.dmp
      Filesize

      408KB

    • memory/2748-138-0x0000000006320000-0x0000000006386000-memory.dmp
      Filesize

      408KB

    • memory/2748-139-0x0000000006970000-0x000000000698E000-memory.dmp
      Filesize

      120KB

    • memory/2748-140-0x00000000081C0000-0x000000000883A000-memory.dmp
      Filesize

      6.5MB

    • memory/2748-141-0x0000000006E10000-0x0000000006E2A000-memory.dmp
      Filesize

      104KB

    • memory/4736-132-0x0000000000330000-0x0000000000482000-memory.dmp
      Filesize

      1.3MB

    • memory/4736-133-0x0000000005B60000-0x0000000005B82000-memory.dmp
      Filesize

      136KB