Analysis
-
max time kernel
98s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-10-2022 04:33
Static task
static1
Behavioral task
behavioral1
Sample
DOC_20221012_094045716_stripped.scr
Resource
win7-20220812-en
General
-
Target
DOC_20221012_094045716_stripped.scr
-
Size
105KB
-
MD5
640cc9bb769a9591c548cc63a15d15bf
-
SHA1
56e456d997ef4f2735b7ba48a3b0e4861327ed61
-
SHA256
ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
-
SHA512
9e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
SSDEEP
3072:M+rR+Y6VgvQdJK0vtNZg/V7S+O+dvvAun:M+BFI3vtNZNH+dv
Malware Config
Extracted
asyncrat
0.5.7B
Oct 11
donzola.duckdns.org:2000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1468-59-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1468-61-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1468-62-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1468-63-0x000000000040C73E-mapping.dmp asyncrat behavioral1/memory/1468-65-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1468-67-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
Windows Media Player Network Sharing Service.exepid process 1168 Windows Media Player Network Sharing Service.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DOC_20221012_094045716_stripped.scrdescription pid process target process PID 1960 set thread context of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
DOC_20221012_094045716_stripped.scrcmd.exetaskeng.exedescription pid process target process PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 1468 1960 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 1960 wrote to memory of 276 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 276 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 276 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 276 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 436 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 436 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 436 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 436 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 588 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 588 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 588 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 1960 wrote to memory of 588 1960 DOC_20221012_094045716_stripped.scr cmd.exe PID 436 wrote to memory of 1380 436 cmd.exe schtasks.exe PID 436 wrote to memory of 1380 436 cmd.exe schtasks.exe PID 436 wrote to memory of 1380 436 cmd.exe schtasks.exe PID 436 wrote to memory of 1380 436 cmd.exe schtasks.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe PID 1392 wrote to memory of 1168 1392 taskeng.exe Windows Media Player Network Sharing Service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr" "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {05193E2C-6366-4106-8507-9FEFBDF88F1E} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
memory/276-68-0x0000000000000000-mapping.dmp
-
memory/436-69-0x0000000000000000-mapping.dmp
-
memory/588-70-0x0000000000000000-mapping.dmp
-
memory/1168-76-0x0000000000310000-0x0000000000330000-memory.dmpFilesize
128KB
-
memory/1168-74-0x0000000000000000-mapping.dmp
-
memory/1380-71-0x0000000000000000-mapping.dmp
-
memory/1468-57-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-67-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-65-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-63-0x000000000040C73E-mapping.dmp
-
memory/1468-62-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-61-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-59-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1468-56-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1960-54-0x0000000000FB0000-0x0000000000FD0000-memory.dmpFilesize
128KB
-
memory/1960-55-0x00000000751A1000-0x00000000751A3000-memory.dmpFilesize
8KB