Analysis

  • max time kernel
    302s
  • max time network
    307s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 03:59

General

  • Target

    6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe

  • Size

    1.8MB

  • MD5

    06db507c42adffa90360eb3f16ba4814

  • SHA1

    ea494b7ff319b10749b0baaad707bc841985f6c4

  • SHA256

    6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76

  • SHA512

    1f12901291e9bac11ad4d25200ff49c81f7fdd3b66787b10ec1dd1bb049823b1ef606dd8d949016fc7de0630794fa38131d3727f2f0f205d568037a758adbcf2

  • SSDEEP

    49152:c0OB/3taBrb/TMvO90d7HjmAFd4A64nsfJ4LigXG/jpCeqBz1:I3417

Malware Config

Extracted

Family

asyncrat

Version

1.0.7 - modded by last

Botnet

New

C2

nicehash.at:4343

Mutex

adsasutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    GoogleDriver.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

bitrat

Version

1.38

C2

nicehash.at:6000

Attributes
  • communication_password

    005f16f264f006578c55237781f36898

  • install_dir

    JavaHelper

  • install_file

    Java.exe

  • tor_process

    tor

Extracted

Family

redline

Botnet

cheat

C2

nicehash.at:1338

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Async RAT payload 7 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe
    "C:\Users\Admin\AppData\Local\Temp\6d42060f990b9861982be51ef06c39b2c7b1bd8b4a06b36cf8434f70f44cce76.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe "Start-Process cmd \"/k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 1\" -Verb RunAs -WindowStyle hidden -ErrorAction SilentlyContinue"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath 'C:\'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1040
        • C:\Windows\system32\fsutil.exe
          fsutil file createnew C:\Users\Admin\AppData\Roaming\excluded.txt 1
          4⤵
            PID:268
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe "Start-Process cmd \"/k start %AppData%\sqatyavkpcidpvwiialfnbdpawluusrm.exe\" -WindowStyle hidden"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:656
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /k start %AppData%\sqatyavkpcidpvwiialfnbdpawluusrm.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1424
          • C:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exe
            C:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1544
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"' & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:688
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "GoogleDriver" /tr '"C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"'
                6⤵
                • Creates scheduled task(s)
                PID:1880
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp898B.tmp.bat""
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1588
              • C:\Windows\system32\timeout.exe
                timeout 3
                6⤵
                • Delays execution with timeout.exe
                PID:1000
              • C:\Users\Admin\AppData\Roaming\GoogleDriver.exe
                "C:\Users\Admin\AppData\Roaming\GoogleDriver.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:868
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"' & exit
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2028
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bit.exe"'
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1920
                    • C:\Users\Admin\AppData\Local\Temp\bit.exe
                      "C:\Users\Admin\AppData\Local\Temp\bit.exe"
                      9⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:1480
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"' & exit
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1596
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rdln.exe"'
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1696
                    • C:\Users\Admin\AppData\Local\Temp\rdln.exe
                      "C:\Users\Admin\AppData\Local\Temp\rdln.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1000

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bit.exe

      Filesize

      1.4MB

      MD5

      32d4216d4ef2af912921fc2931c0bd88

      SHA1

      3e79dd260b67ed27134246e9461d8878c7ac73e3

      SHA256

      d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf

      SHA512

      7a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37

    • C:\Users\Admin\AppData\Local\Temp\bit.exe

      Filesize

      1.4MB

      MD5

      32d4216d4ef2af912921fc2931c0bd88

      SHA1

      3e79dd260b67ed27134246e9461d8878c7ac73e3

      SHA256

      d1ecf0f3592c06329182cbcd25fa654bb48c441c0b54bfb5c4b40fbaa517cdbf

      SHA512

      7a25bcf3954238ab946ce95dc4153518fe67e773845f2bd037eac64c93906223b3ec611a04160cc20f85c4afa0b7124c8eacb43667ecb3fdde2776698f5b2b37

    • C:\Users\Admin\AppData\Local\Temp\rdln.exe

      Filesize

      95KB

      MD5

      6aefd743bed0887a18bbbd3b0c533dfb

      SHA1

      bb8140a7efc7a1dec295fa4894b0efa7203c6b49

      SHA256

      001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1

      SHA512

      70cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929

    • C:\Users\Admin\AppData\Local\Temp\rdln.exe

      Filesize

      95KB

      MD5

      6aefd743bed0887a18bbbd3b0c533dfb

      SHA1

      bb8140a7efc7a1dec295fa4894b0efa7203c6b49

      SHA256

      001170049bf107796ad564d572ef540743e0a66805f61a51a980998f7c09f5d1

      SHA512

      70cc520173a922443d4ec81f487227a4d6a5e2c3f7d3cee1c0a6ecc94cf8ceee64e53d75e6f6a5f51d0ae050939d78b9cad9d72bf5a3872c72a2ad7a69842929

    • C:\Users\Admin\AppData\Local\Temp\tmp898B.tmp.bat

      Filesize

      156B

      MD5

      a6c89f904b9dea36c287358972daca28

      SHA1

      3f75b541623295544814b9ab5c3db875e4d945d5

      SHA256

      c3336cc0edc228417f3a5e28baf9834878a1f9cb1b65ee21a2c668f9af13409b

      SHA512

      b24d5eb017e0be3aa042baf9ead35c8cb378aceec9249fb126c22af0183592f3a477c94d8f6902705dcef5476bba8672af090812819e2161efcd3af941b9a514

    • C:\Users\Admin\AppData\Roaming\GoogleDriver.exe

      Filesize

      63KB

      MD5

      dae21c538a7a4f8294d7e19916be9100

      SHA1

      cea1c44030c6f45243a9408e59f8e43304402438

      SHA256

      3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4

      SHA512

      8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26

    • C:\Users\Admin\AppData\Roaming\GoogleDriver.exe

      Filesize

      63KB

      MD5

      dae21c538a7a4f8294d7e19916be9100

      SHA1

      cea1c44030c6f45243a9408e59f8e43304402438

      SHA256

      3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4

      SHA512

      8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      ceb874a5b101bbbc563635cde5c3b992

      SHA1

      fb5e6c087e80fcc24c43f922644a5469720059a8

      SHA256

      7193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7

      SHA512

      d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      ceb874a5b101bbbc563635cde5c3b992

      SHA1

      fb5e6c087e80fcc24c43f922644a5469720059a8

      SHA256

      7193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7

      SHA512

      d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      ceb874a5b101bbbc563635cde5c3b992

      SHA1

      fb5e6c087e80fcc24c43f922644a5469720059a8

      SHA256

      7193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7

      SHA512

      d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

      Filesize

      7KB

      MD5

      ceb874a5b101bbbc563635cde5c3b992

      SHA1

      fb5e6c087e80fcc24c43f922644a5469720059a8

      SHA256

      7193f0ded7fe33d351673f308c4c3b3ca47ecd806190539db6205f2f085ed8b7

      SHA512

      d204307bb735f223da47cb3941c334336322b8b9f20c7a993003c33e90f84973f04ac17d9976a6d53ed31506e319a2c65144d26858a1d1dfcee54540ee4f652e

    • C:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exe

      Filesize

      63KB

      MD5

      dae21c538a7a4f8294d7e19916be9100

      SHA1

      cea1c44030c6f45243a9408e59f8e43304402438

      SHA256

      3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4

      SHA512

      8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26

    • C:\Users\Admin\AppData\Roaming\sqatyavkpcidpvwiialfnbdpawluusrm.exe

      Filesize

      63KB

      MD5

      dae21c538a7a4f8294d7e19916be9100

      SHA1

      cea1c44030c6f45243a9408e59f8e43304402438

      SHA256

      3184a8183ddd00795ae4da31244c3bdf010ab97addc4df2b66129982c9ede4e4

      SHA512

      8e9dd2b4e4ec9b28cb7c40e41f6ba8607e1c16351398d5de84965ee0a596fe255b8bfafb61eee99c83281d7cb43b029695ce68db3b7c942acfe392d63f7d4e26

    • memory/656-79-0x0000000001F34000-0x0000000001F37000-memory.dmp

      Filesize

      12KB

    • memory/656-75-0x000007FEF47E0000-0x000007FEF5203000-memory.dmp

      Filesize

      10.1MB

    • memory/656-76-0x000007FEF3C80000-0x000007FEF47DD000-memory.dmp

      Filesize

      11.4MB

    • memory/656-77-0x0000000001F34000-0x0000000001F37000-memory.dmp

      Filesize

      12KB

    • memory/656-80-0x0000000001F3B000-0x0000000001F5A000-memory.dmp

      Filesize

      124KB

    • memory/868-94-0x0000000000440000-0x0000000000460000-memory.dmp

      Filesize

      128KB

    • memory/868-93-0x00000000011C0000-0x00000000011D6000-memory.dmp

      Filesize

      88KB

    • memory/1000-126-0x0000000001100000-0x000000000111E000-memory.dmp

      Filesize

      120KB

    • memory/1040-70-0x0000000002674000-0x0000000002677000-memory.dmp

      Filesize

      12KB

    • memory/1040-68-0x0000000002674000-0x0000000002677000-memory.dmp

      Filesize

      12KB

    • memory/1040-67-0x000007FEF4620000-0x000007FEF517D000-memory.dmp

      Filesize

      11.4MB

    • memory/1040-69-0x000000000267B000-0x000000000269A000-memory.dmp

      Filesize

      124KB

    • memory/1040-66-0x000007FEF5180000-0x000007FEF5BA3000-memory.dmp

      Filesize

      10.1MB

    • memory/1480-129-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/1480-128-0x0000000000400000-0x00000000007E4000-memory.dmp

      Filesize

      3.9MB

    • memory/1480-111-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/1480-110-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/1480-109-0x0000000000400000-0x00000000007E4000-memory.dmp

      Filesize

      3.9MB

    • memory/1480-108-0x0000000075C61000-0x0000000075C63000-memory.dmp

      Filesize

      8KB

    • memory/1480-130-0x0000000000320000-0x000000000032A000-memory.dmp

      Filesize

      40KB

    • memory/1544-84-0x0000000000210000-0x0000000000226000-memory.dmp

      Filesize

      88KB

    • memory/1696-120-0x000000001B750000-0x000000001BA4F000-memory.dmp

      Filesize

      3.0MB

    • memory/1696-118-0x000007FEEB270000-0x000007FEEBDCD000-memory.dmp

      Filesize

      11.4MB

    • memory/1696-117-0x000007FEEBDD0000-0x000007FEEC7F3000-memory.dmp

      Filesize

      10.1MB

    • memory/1696-119-0x0000000002584000-0x0000000002587000-memory.dmp

      Filesize

      12KB

    • memory/1696-124-0x0000000002584000-0x0000000002587000-memory.dmp

      Filesize

      12KB

    • memory/1696-125-0x000000000258B000-0x00000000025AA000-memory.dmp

      Filesize

      124KB

    • memory/1920-101-0x000000001B8F0000-0x000000001BBEF000-memory.dmp

      Filesize

      3.0MB

    • memory/1920-100-0x000007FEEBC10000-0x000007FEEC76D000-memory.dmp

      Filesize

      11.4MB

    • memory/1920-107-0x000000000248B000-0x00000000024AA000-memory.dmp

      Filesize

      124KB

    • memory/1920-99-0x000007FEEC770000-0x000007FEED193000-memory.dmp

      Filesize

      10.1MB

    • memory/1920-103-0x000000000248B000-0x00000000024AA000-memory.dmp

      Filesize

      124KB

    • memory/1920-102-0x0000000002484000-0x0000000002487000-memory.dmp

      Filesize

      12KB

    • memory/2004-59-0x000000001B700000-0x000000001B9FF000-memory.dmp

      Filesize

      3.0MB

    • memory/2004-56-0x000007FEF47E0000-0x000007FEF5203000-memory.dmp

      Filesize

      10.1MB

    • memory/2004-55-0x000007FEFC3B1000-0x000007FEFC3B3000-memory.dmp

      Filesize

      8KB

    • memory/2004-57-0x000007FEF3C80000-0x000007FEF47DD000-memory.dmp

      Filesize

      11.4MB

    • memory/2004-61-0x00000000028F4000-0x00000000028F7000-memory.dmp

      Filesize

      12KB

    • memory/2004-58-0x00000000028F4000-0x00000000028F7000-memory.dmp

      Filesize

      12KB

    • memory/2004-62-0x00000000028FB000-0x000000000291A000-memory.dmp

      Filesize

      124KB