Resubmissions

08-10-2022 15:38

221008-s23p1sehf8 10

Analysis

  • max time kernel
    39s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2022 15:38

General

  • Target

    ManyCam 8 Multilingual/ManyCam 8 Multilingual/ManyCam 8 Multilingual/Crack_Patch/manycam 8-MPT.exe

  • Size

    557KB

  • MD5

    948df9371c1dd0928496cafb9da6d9b4

  • SHA1

    5725d22fc6dc187c39aad31febabb41771ce4b83

  • SHA256

    f9ab094a0d2b47684d8bbc5a430c111ab3aa18e7aa3d2a70f7157829808322e4

  • SHA512

    fb8aebde61d299463122bff606ad578d07a952b106979bc824cc3e9fdff806338e1db8c82aabdd3c27c3baf517acec7dfb64e2f6eef03dca46cf0668b061ef8a

  • SSDEEP

    12288:96Wq4aaE6KwyF5L0Y2D1PqLXLvjZhsbooEuo9wgng3wnePR/:rthEVaPqLXLvjZWFEPwbXPR/

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.6E

Botnet

Default

C2

dilescemo.servegame.com:2222

Mutex

ywmtlgzamxo

Attributes
  • delay

    1

  • install

    true

  • install_file

    windows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 10 IoCs
  • Executes dropped EXE 3 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 9 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ManyCam 8 Multilingual\ManyCam 8 Multilingual\ManyCam 8 Multilingual\Crack_Patch\manycam 8-MPT.exe
    "C:\Users\Admin\AppData\Local\Temp\ManyCam 8 Multilingual\ManyCam 8 Multilingual\ManyCam 8 Multilingual\Crack_Patch\manycam 8-MPT.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\File1.exe
      "C:\Users\Admin\AppData\Local\Temp\File1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:948
    • C:\Users\Admin\AppData\Local\Temp\File2.exe
      "C:\Users\Admin\AppData\Local\Temp\File2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn File2 /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn File2 /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:2028
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp26B4.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1912
        • C:\Users\Admin\AppData\Roaming\windows.exe
          "C:\Users\Admin\AppData\Roaming\windows.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:268
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x204
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2024

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\File1.exe
    Filesize

    229KB

    MD5

    99bc00543dd33142549458775fc146a8

    SHA1

    757f6569d16699fdb1f1597d6bac245fe2f88d27

    SHA256

    3bacbaf79d434a128d3a32792ab8f87aaa4854dacb89f475d4dec0f3addbd33c

    SHA512

    d77214c376d719217cdf830e4bc41251181750f330e9aa0b9d4ddb2e61959068780e8a2aa1c216f5217954436561bb643112bbf7a3dd269c07257ce8e7d0d8e2

  • C:\Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • C:\Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • C:\Users\Admin\AppData\Local\Temp\tmp26B4.tmp.bat
    Filesize

    151B

    MD5

    1a96e9f86666b7c0233bd0853c47af52

    SHA1

    76e42039fd6ce4559398697cab7bb681764d8d2c

    SHA256

    e541eb4d472e38a937c4280314866678df1fbdda012f23832c088a5e749ac0c8

    SHA512

    2c2cb32986da8709fa054bd4bef946a53db94db3059968eed8fae9a001c643f006965bbd6d95fab77fb50c9c6e7ac98d97670100538562e5c0ccbc131a2a28cd

  • C:\Users\Admin\AppData\Roaming\windows.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • C:\Users\Admin\AppData\Roaming\windows.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • \Users\Admin\AppData\Local\Temp\File1.exe
    Filesize

    229KB

    MD5

    99bc00543dd33142549458775fc146a8

    SHA1

    757f6569d16699fdb1f1597d6bac245fe2f88d27

    SHA256

    3bacbaf79d434a128d3a32792ab8f87aaa4854dacb89f475d4dec0f3addbd33c

    SHA512

    d77214c376d719217cdf830e4bc41251181750f330e9aa0b9d4ddb2e61959068780e8a2aa1c216f5217954436561bb643112bbf7a3dd269c07257ce8e7d0d8e2

  • \Users\Admin\AppData\Local\Temp\File1.exe
    Filesize

    229KB

    MD5

    99bc00543dd33142549458775fc146a8

    SHA1

    757f6569d16699fdb1f1597d6bac245fe2f88d27

    SHA256

    3bacbaf79d434a128d3a32792ab8f87aaa4854dacb89f475d4dec0f3addbd33c

    SHA512

    d77214c376d719217cdf830e4bc41251181750f330e9aa0b9d4ddb2e61959068780e8a2aa1c216f5217954436561bb643112bbf7a3dd269c07257ce8e7d0d8e2

  • \Users\Admin\AppData\Local\Temp\File1.exe
    Filesize

    229KB

    MD5

    99bc00543dd33142549458775fc146a8

    SHA1

    757f6569d16699fdb1f1597d6bac245fe2f88d27

    SHA256

    3bacbaf79d434a128d3a32792ab8f87aaa4854dacb89f475d4dec0f3addbd33c

    SHA512

    d77214c376d719217cdf830e4bc41251181750f330e9aa0b9d4ddb2e61959068780e8a2aa1c216f5217954436561bb643112bbf7a3dd269c07257ce8e7d0d8e2

  • \Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • \Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • \Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • \Users\Admin\AppData\Local\Temp\File2.exe
    Filesize

    47KB

    MD5

    5a4203bfe138541a159e87919e6b9850

    SHA1

    15945294b819105a008b763c16414d245fb130ce

    SHA256

    ebbb96e7bee4784af56950ca01fcfa65777a5297294bc91c67c2446aae1a2d5a

    SHA512

    53dcd6c8b6dafe2a193574413520f4f02af97ff119e99c448a111b0be544b2cd3af1b23bf954e043ed6cf3eb55f19310d9499b17863f0457a71afd7ac00e8c7f

  • \Users\Admin\AppData\Local\Temp\bassmod.dll
    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • \Users\Admin\AppData\Local\Temp\dup2patcher.dll
    Filesize

    195KB

    MD5

    0f6a9bbbff53c8c215d1f0ce566b0f5e

    SHA1

    28906d516edf25fb58b6cc755725fde4504ab5b8

    SHA256

    380c0e3953de8cd1ce3793930821b85e02e40cfb13be3e1b57a44782f877dbdf

    SHA512

    a3007152c7927bb57d0887df82966f02fce739f7ce168f7f61676795a0d133519a007f0d2d9e41a645670eafce4b66a1682417e7e4b73973d28187e85c84e255

  • memory/268-80-0x0000000000000000-mapping.dmp
  • memory/268-83-0x0000000000A40000-0x0000000000A52000-memory.dmp
    Filesize

    72KB

  • memory/276-76-0x0000000000000000-mapping.dmp
  • memory/292-75-0x0000000000000000-mapping.dmp
  • memory/864-68-0x0000000000400000-0x00000000004C4000-memory.dmp
    Filesize

    784KB

  • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp
    Filesize

    8KB

  • memory/948-73-0x0000000074400000-0x0000000074490000-memory.dmp
    Filesize

    576KB

  • memory/948-74-0x00000000000C0000-0x00000000000C3000-memory.dmp
    Filesize

    12KB

  • memory/948-72-0x0000000010000000-0x0000000010013000-memory.dmp
    Filesize

    76KB

  • memory/948-58-0x0000000000000000-mapping.dmp
  • memory/948-84-0x0000000010000000-0x0000000010013000-memory.dmp
    Filesize

    76KB

  • memory/1336-66-0x0000000000000000-mapping.dmp
  • memory/1336-71-0x0000000000AB0000-0x0000000000AC2000-memory.dmp
    Filesize

    72KB

  • memory/1912-79-0x0000000000000000-mapping.dmp
  • memory/2028-78-0x0000000000000000-mapping.dmp