Analysis
-
max time kernel
169s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2022 04:33
Static task
static1
Behavioral task
behavioral1
Sample
DOC_20221012_094045716_stripped.scr
Resource
win7-20220812-en
General
-
Target
DOC_20221012_094045716_stripped.scr
-
Size
105KB
-
MD5
640cc9bb769a9591c548cc63a15d15bf
-
SHA1
56e456d997ef4f2735b7ba48a3b0e4861327ed61
-
SHA256
ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
-
SHA512
9e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
SSDEEP
3072:M+rR+Y6VgvQdJK0vtNZg/V7S+O+dvvAun:M+BFI3vtNZNH+dv
Malware Config
Extracted
asyncrat
0.5.7B
Oct 11
donzola.duckdns.org:2000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5056-136-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
Windows Media Player Network Sharing Service.exeWindows Media Player Network Sharing Service.exeWindows Media Player Network Sharing Service.exepid process 3648 Windows Media Player Network Sharing Service.exe 3700 Windows Media Player Network Sharing Service.exe 880 Windows Media Player Network Sharing Service.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DOC_20221012_094045716_stripped.scrWindows Media Player Network Sharing Service.exedescription pid process target process PID 2044 set thread context of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 3648 set thread context of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4244 4508 WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2340 schtasks.exe 2332 schtasks.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
DOC_20221012_094045716_stripped.scrcmd.exeWindows Media Player Network Sharing Service.execmd.exedescription pid process target process PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 5056 2044 DOC_20221012_094045716_stripped.scr DOC_20221012_094045716_stripped.scr PID 2044 wrote to memory of 3368 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 3368 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 3368 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 960 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 960 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 960 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 4604 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 4604 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 2044 wrote to memory of 4604 2044 DOC_20221012_094045716_stripped.scr cmd.exe PID 960 wrote to memory of 2340 960 cmd.exe schtasks.exe PID 960 wrote to memory of 2340 960 cmd.exe schtasks.exe PID 960 wrote to memory of 2340 960 cmd.exe schtasks.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 3700 3648 Windows Media Player Network Sharing Service.exe Windows Media Player Network Sharing Service.exe PID 3648 wrote to memory of 1596 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 1596 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 1596 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 4268 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 4268 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 4268 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 3624 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 3624 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 3648 wrote to memory of 3624 3648 Windows Media Player Network Sharing Service.exe cmd.exe PID 4268 wrote to memory of 2332 4268 cmd.exe schtasks.exe PID 4268 wrote to memory of 2332 4268 cmd.exe schtasks.exe PID 4268 wrote to memory of 2332 4268 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\DOC_20221012_094045716_stripped.scr" "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"2⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 468 -p 4508 -ip 45081⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4508 -s 24601⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe" "C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Media Player Network Sharing Service.exe.logFilesize
612B
MD54bc94363628f46b343c5e8e2da62ca26
SHA18a41ac46e24d790e11a407d0e957c4a6be6056c4
SHA256c8e1d0b306825b2c9a3ed32a461dd191ceb861205425fdfb687a4889684a3e1a
SHA512cf8ede5b84ba775d8ff89752530fa899d6b2e6424549202ab782a3caa92c0d9a31e9b2f660b51eedc932a68ba25e9ec228bb965cdc183e600ea8aa5a6736f829
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
C:\Users\Admin\AppData\Roaming\Windows Media Player Network Sharing Service\Windows Media Player Network Sharing Service.exeFilesize
105KB
MD5640cc9bb769a9591c548cc63a15d15bf
SHA156e456d997ef4f2735b7ba48a3b0e4861327ed61
SHA256ef1cddd57724a667599eb57a77aedde1f256853f54698a68a610c3d54f924f1e
SHA5129e05ca442fae59a54d25fced3a156cd7eb00ba4a0ec80e69468a06639b558ee34c6c6509815eb9a10e6f833d34d48832f073fa7c0f4075ee8da16283d0a58d06
-
memory/960-138-0x0000000000000000-mapping.dmp
-
memory/1596-146-0x0000000000000000-mapping.dmp
-
memory/2044-133-0x0000000005480000-0x0000000005A24000-memory.dmpFilesize
5.6MB
-
memory/2044-134-0x0000000004F80000-0x0000000004FE6000-memory.dmpFilesize
408KB
-
memory/2044-132-0x00000000005D0000-0x00000000005F0000-memory.dmpFilesize
128KB
-
memory/2332-149-0x0000000000000000-mapping.dmp
-
memory/2340-140-0x0000000000000000-mapping.dmp
-
memory/3368-137-0x0000000000000000-mapping.dmp
-
memory/3624-148-0x0000000000000000-mapping.dmp
-
memory/3700-143-0x0000000000000000-mapping.dmp
-
memory/4268-147-0x0000000000000000-mapping.dmp
-
memory/4604-139-0x0000000000000000-mapping.dmp
-
memory/5056-136-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/5056-135-0x0000000000000000-mapping.dmp