Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 07:40
Behavioral task
behavioral1
Sample
0x000a0000000122e5-58.exe
Resource
win7-20220901-en
General
-
Target
0x000a0000000122e5-58.exe
-
Size
45KB
-
MD5
9e320f6163f8d53462d45fbebc282c64
-
SHA1
b2e0a591204581e78f0ae85ff42a7ca02542e2ae
-
SHA256
43356bfd3875d34f14405392208bc7f3c6f71d7fea011ab9acf922acc8c589c5
-
SHA512
4c6d6a76f335d43b36866a0923ed8b6b685761ae61f3910b9c02df2fa60374fe3b6f53361e2d73ff3f5d0243e406aa337682d82c9f923dcf98f98345e727ad65
-
SSDEEP
768:7uYK9T3kH1jWUvmqRmo2qb0befKoClbPImzjbLgX3iqftcnWDGgjovSTBDZLx:7uYK9T34l2vyyoJm3b0XSqVDJjoS1dLx
Malware Config
Extracted
asyncrat
0.5.7B
Default
fresh02.ddns.net:2245
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
logs.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3112-132-0x0000000000640000-0x0000000000652000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\logs.exe asyncrat C:\Users\Admin\AppData\Roaming\logs.exe asyncrat -
Executes dropped EXE 1 IoCs
Processes:
logs.exepid process 988 logs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0x000a0000000122e5-58.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 0x000a0000000122e5-58.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1252 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
0x000a0000000122e5-58.exepid process 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe 3112 0x000a0000000122e5-58.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0x000a0000000122e5-58.exelogs.exedescription pid process Token: SeDebugPrivilege 3112 0x000a0000000122e5-58.exe Token: SeDebugPrivilege 988 logs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0x000a0000000122e5-58.execmd.execmd.exedescription pid process target process PID 3112 wrote to memory of 2980 3112 0x000a0000000122e5-58.exe cmd.exe PID 3112 wrote to memory of 2980 3112 0x000a0000000122e5-58.exe cmd.exe PID 3112 wrote to memory of 2980 3112 0x000a0000000122e5-58.exe cmd.exe PID 3112 wrote to memory of 2268 3112 0x000a0000000122e5-58.exe cmd.exe PID 3112 wrote to memory of 2268 3112 0x000a0000000122e5-58.exe cmd.exe PID 3112 wrote to memory of 2268 3112 0x000a0000000122e5-58.exe cmd.exe PID 2980 wrote to memory of 4700 2980 cmd.exe schtasks.exe PID 2980 wrote to memory of 4700 2980 cmd.exe schtasks.exe PID 2980 wrote to memory of 4700 2980 cmd.exe schtasks.exe PID 2268 wrote to memory of 1252 2268 cmd.exe timeout.exe PID 2268 wrote to memory of 1252 2268 cmd.exe timeout.exe PID 2268 wrote to memory of 1252 2268 cmd.exe timeout.exe PID 2268 wrote to memory of 988 2268 cmd.exe logs.exe PID 2268 wrote to memory of 988 2268 cmd.exe logs.exe PID 2268 wrote to memory of 988 2268 cmd.exe logs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000a0000000122e5-58.exe"C:\Users\Admin\AppData\Local\Temp\0x000a0000000122e5-58.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "logs" /tr '"C:\Users\Admin\AppData\Roaming\logs.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "logs" /tr '"C:\Users\Admin\AppData\Roaming\logs.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFC27.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\logs.exe"C:\Users\Admin\AppData\Roaming\logs.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpFC27.tmp.batFilesize
148B
MD5e29cfe6718ba3813a311a53e8671e787
SHA11e35909dab1e18446bb727fbe2cff5d491c38bbc
SHA2565e7ae36cddf23a5f320f3e1e5900b7e51e18ba20d3a969e4432882d9512ac498
SHA512ccd75ab62af1fd97c160635d5bfac0621b830afca499881cef3fee11d8aa5585235896b8c7dba7c9970de9abee0be339e6a3cd4c8ce302720ebcede41f34a846
-
C:\Users\Admin\AppData\Roaming\logs.exeFilesize
45KB
MD59e320f6163f8d53462d45fbebc282c64
SHA1b2e0a591204581e78f0ae85ff42a7ca02542e2ae
SHA25643356bfd3875d34f14405392208bc7f3c6f71d7fea011ab9acf922acc8c589c5
SHA5124c6d6a76f335d43b36866a0923ed8b6b685761ae61f3910b9c02df2fa60374fe3b6f53361e2d73ff3f5d0243e406aa337682d82c9f923dcf98f98345e727ad65
-
C:\Users\Admin\AppData\Roaming\logs.exeFilesize
45KB
MD59e320f6163f8d53462d45fbebc282c64
SHA1b2e0a591204581e78f0ae85ff42a7ca02542e2ae
SHA25643356bfd3875d34f14405392208bc7f3c6f71d7fea011ab9acf922acc8c589c5
SHA5124c6d6a76f335d43b36866a0923ed8b6b685761ae61f3910b9c02df2fa60374fe3b6f53361e2d73ff3f5d0243e406aa337682d82c9f923dcf98f98345e727ad65
-
memory/988-139-0x0000000000000000-mapping.dmp
-
memory/1252-138-0x0000000000000000-mapping.dmp
-
memory/2268-135-0x0000000000000000-mapping.dmp
-
memory/2980-134-0x0000000000000000-mapping.dmp
-
memory/3112-132-0x0000000000640000-0x0000000000652000-memory.dmpFilesize
72KB
-
memory/3112-133-0x0000000005320000-0x00000000053BC000-memory.dmpFilesize
624KB
-
memory/4700-137-0x0000000000000000-mapping.dmp