Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 05:48

General

  • Target

    63F13767CD38209385164D5517A55A6846996268F7C3C.exe

  • Size

    900KB

  • MD5

    a494a81f17b65fca1bdbb853b6556172

  • SHA1

    71ea522b0832d85875432842ff55f337e4a08081

  • SHA256

    63f13767cd38209385164d5517a55a6846996268f7c3ca03bbb8c4129259b4b9

  • SHA512

    aeb70d879e94101476697420991a9236670297c0793ca16399aa80e9c75bfb9b347a95b723245555c0a6c039e7a001dbd8ed378acbca589eafbd3d66a585a3a9

  • SSDEEP

    12288:M6qjziyoNL4bVwBJ4pKhYKgWD4qH4JuteNqvRH5IYtwpjgFp:Mdj4L48J7qKx0MrZH5IYtdp

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63F13767CD38209385164D5517A55A6846996268F7C3C.exe
    "C:\Users\Admin\AppData\Local\Temp\63F13767CD38209385164D5517A55A6846996268F7C3C.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Roaming\Google Chrome.exe
      "C:\Users\Admin\AppData\Roaming\Google Chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1480
          • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
            "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1784
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /C schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              6⤵
                PID:1120
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                  7⤵
                  • Creates scheduled task(s)
                  PID:624
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1476
            • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe
              "C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"
              5⤵
              • Executes dropped EXE
              PID:1216
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1480
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1212
            • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe
              "C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"
              5⤵
                PID:948
        • C:\Users\Admin\AppData\Local\Temp\smAIO Multichecker[x86].exe
          "C:\Users\Admin\AppData\Local\Temp\smAIO Multichecker[x86].exe"
          2⤵
          • Executes dropped EXE
          PID:800
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {C07A16BD-EDDC-41FA-AA14-6BA055379155} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]
        1⤵
          PID:1884

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

          Filesize

          2.5MB

          MD5

          7bc0a36bc35c40f23951db94ec13568f

          SHA1

          308a8a7b160a890fd8074649575295dd23dac873

          SHA256

          b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

          SHA512

          fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

        • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

          Filesize

          2.5MB

          MD5

          7bc0a36bc35c40f23951db94ec13568f

          SHA1

          308a8a7b160a890fd8074649575295dd23dac873

          SHA256

          b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

          SHA512

          fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

        • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe

          Filesize

          1.1MB

          MD5

          eb2638d6bcfc1bf53ceec7e191489298

          SHA1

          19163e2413576c7dfdbcab020ac49ec1d2f1f614

          SHA256

          e74d33526939e9b2c34821429b65c456b29705243ec18a97fc40216fde02db75

          SHA512

          0ecca9c7e85cc5cb88d0bb7d5bb896e9b78e60949c4335dcd6a15a68254f5d0d2be54c47215b2e123283902bd2aff3597dfe9dfabbd91a2b27ffd51747738ad3

        • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe

          Filesize

          640KB

          MD5

          1253d02daf2a7e1df442f4178a3baa3e

          SHA1

          cc17d29fcac0c367289ab544796ebf0bf2716b0d

          SHA256

          270590bdfab7a8fc9e558444526324043f902aaf7796d8d7ca68c6f74aa24232

          SHA512

          46681381969e9c07b750a71f0378c6f8bc7de44e22b1b9a6020f3bee8cbc4412aeb6af768f8968555af506c6554731f37ae47bc2274113b9011eec5efe406e9d

        • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

          Filesize

          196KB

          MD5

          8d0042b80d25d0c74a619a3d594c9deb

          SHA1

          c13fe83d6cfbdd37d8e24a908ed65fedd964e723

          SHA256

          955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

          SHA512

          0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

        • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

          Filesize

          196KB

          MD5

          8d0042b80d25d0c74a619a3d594c9deb

          SHA1

          c13fe83d6cfbdd37d8e24a908ed65fedd964e723

          SHA256

          955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

          SHA512

          0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

        • C:\Users\Admin\AppData\Local\Temp\smAIO Multichecker[x86].exe

          Filesize

          105KB

          MD5

          ec6b7dea7881d230d73c0a14229a88d5

          SHA1

          40af3c096fd4ebdf967dc970b671f6b418bfeb16

          SHA256

          67b98ba9047d4e096c67ce4e39365dbf75cecd25d13487aa5dbf7a220ba2428e

          SHA512

          6b345a4477607599bf5f13ee74c0167536df4a15de1f3d57d31c4623ba743777742024d5934c59c210ca608f8b7b1bbd6445afa0290c1fdb055094ae30becc48

        • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

          Filesize

          403KB

          MD5

          f903148b5a0c07db2c61ce05fa5c7db2

          SHA1

          b636a8bf5769f7fe27c263eab54026ac03732ad4

          SHA256

          2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

          SHA512

          3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

        • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

          Filesize

          403KB

          MD5

          f903148b5a0c07db2c61ce05fa5c7db2

          SHA1

          b636a8bf5769f7fe27c263eab54026ac03732ad4

          SHA256

          2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

          SHA512

          3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          5317bfbc560c6e69e6e4181054e94076

          SHA1

          bec842fb7e5ad274e7e35cdeba4f2eba2b977308

          SHA256

          beab72d79d44be62fa8913819b1b9193aa5e44b2350456218313ba550a286490

          SHA512

          cc6671a248a79448d3289573adb8c99fc94feed582d732377367ea8bec0c315ba485c4661d20ab73c5de0cfdc3f69e6efc0ce0988c55ded63206f77de3d5351c

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          5317bfbc560c6e69e6e4181054e94076

          SHA1

          bec842fb7e5ad274e7e35cdeba4f2eba2b977308

          SHA256

          beab72d79d44be62fa8913819b1b9193aa5e44b2350456218313ba550a286490

          SHA512

          cc6671a248a79448d3289573adb8c99fc94feed582d732377367ea8bec0c315ba485c4661d20ab73c5de0cfdc3f69e6efc0ce0988c55ded63206f77de3d5351c

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          275KB

          MD5

          32a56b4e67436bdd3d39809a9be949b8

          SHA1

          dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

          SHA256

          5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

          SHA512

          70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          275KB

          MD5

          32a56b4e67436bdd3d39809a9be949b8

          SHA1

          dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

          SHA256

          5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

          SHA512

          70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

        • \Users\Admin\AppData\Local\Temp\DevCWO.exe

          Filesize

          2.5MB

          MD5

          7bc0a36bc35c40f23951db94ec13568f

          SHA1

          308a8a7b160a890fd8074649575295dd23dac873

          SHA256

          b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

          SHA512

          fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

        • \Users\Admin\AppData\Local\Temp\DevRVO.exe

          Filesize

          256KB

          MD5

          0335817e247b5901270532f601ef37ef

          SHA1

          5f5a10cd00b153fcfff7a11371a770cffa537dc8

          SHA256

          dc7d872b48d3152c70d240586d23609562536dfccb1e31fac17c8b45af175454

          SHA512

          723815517c915649f04105086519f8133e5f1d3ba466cc43921a690e65bb19f698e37376b2923ffbc610ce6dcba1fef074ae2c1ceb00fa89994b23c8de61d0dc

        • \Users\Admin\AppData\Local\Temp\smAIO Multichecker[x86].exe

          Filesize

          105KB

          MD5

          ec6b7dea7881d230d73c0a14229a88d5

          SHA1

          40af3c096fd4ebdf967dc970b671f6b418bfeb16

          SHA256

          67b98ba9047d4e096c67ce4e39365dbf75cecd25d13487aa5dbf7a220ba2428e

          SHA512

          6b345a4477607599bf5f13ee74c0167536df4a15de1f3d57d31c4623ba743777742024d5934c59c210ca608f8b7b1bbd6445afa0290c1fdb055094ae30becc48

        • \Users\Admin\AppData\Roaming\Google Chrome.exe

          Filesize

          403KB

          MD5

          f903148b5a0c07db2c61ce05fa5c7db2

          SHA1

          b636a8bf5769f7fe27c263eab54026ac03732ad4

          SHA256

          2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

          SHA512

          3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

        • \Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          275KB

          MD5

          32a56b4e67436bdd3d39809a9be949b8

          SHA1

          dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

          SHA256

          5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

          SHA512

          70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

        • memory/800-86-0x0000000000000000-mapping.dmp

        • memory/800-64-0x0000000000000000-mapping.dmp

        • memory/948-110-0x0000000000000000-mapping.dmp

        • memory/1120-85-0x0000000000000000-mapping.dmp

        • memory/1212-104-0x000007FEEBB10000-0x000007FEEC533000-memory.dmp

          Filesize

          10.1MB

        • memory/1212-101-0x0000000000000000-mapping.dmp

        • memory/1212-105-0x000007FEEAFB0000-0x000007FEEBB0D000-memory.dmp

          Filesize

          11.4MB

        • memory/1212-107-0x000000001B800000-0x000000001BAFF000-memory.dmp

          Filesize

          3.0MB

        • memory/1212-112-0x00000000029A4000-0x00000000029A7000-memory.dmp

          Filesize

          12KB

        • memory/1212-113-0x00000000029AB000-0x00000000029CA000-memory.dmp

          Filesize

          124KB

        • memory/1216-98-0x0000000000230000-0x00000000004B2000-memory.dmp

          Filesize

          2.5MB

        • memory/1216-95-0x0000000000000000-mapping.dmp

        • memory/1352-69-0x0000000000F10000-0x0000000000F7A000-memory.dmp

          Filesize

          424KB

        • memory/1352-57-0x0000000000000000-mapping.dmp

        • memory/1476-87-0x0000000000000000-mapping.dmp

        • memory/1476-90-0x000007FEEB5E0000-0x000007FEEC003000-memory.dmp

          Filesize

          10.1MB

        • memory/1476-91-0x000007FEEAA80000-0x000007FEEB5DD000-memory.dmp

          Filesize

          11.4MB

        • memory/1476-97-0x0000000002574000-0x0000000002577000-memory.dmp

          Filesize

          12KB

        • memory/1476-99-0x000000000257B000-0x000000000259A000-memory.dmp

          Filesize

          124KB

        • memory/1480-76-0x000007FEEBF80000-0x000007FEEC9A3000-memory.dmp

          Filesize

          10.1MB

        • memory/1480-78-0x000000001B710000-0x000000001BA0F000-memory.dmp

          Filesize

          3.0MB

        • memory/1480-84-0x000000000291B000-0x000000000293A000-memory.dmp

          Filesize

          124KB

        • memory/1480-77-0x000007FEEB420000-0x000007FEEBF7D000-memory.dmp

          Filesize

          11.4MB

        • memory/1480-100-0x0000000000000000-mapping.dmp

        • memory/1480-82-0x0000000002914000-0x0000000002917000-memory.dmp

          Filesize

          12KB

        • memory/1480-75-0x000007FEFC141000-0x000007FEFC143000-memory.dmp

          Filesize

          8KB

        • memory/1480-74-0x0000000000000000-mapping.dmp

        • memory/1504-55-0x0000000074C70000-0x000000007521B000-memory.dmp

          Filesize

          5.7MB

        • memory/1504-68-0x0000000074C70000-0x000000007521B000-memory.dmp

          Filesize

          5.7MB

        • memory/1504-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

          Filesize

          8KB

        • memory/1648-73-0x0000000000000000-mapping.dmp

        • memory/1744-70-0x0000000000E70000-0x0000000000EBA000-memory.dmp

          Filesize

          296KB

        • memory/1744-72-0x0000000000E60000-0x0000000000E6C000-memory.dmp

          Filesize

          48KB

        • memory/1744-106-0x000000001A2C0000-0x000000001A324000-memory.dmp

          Filesize

          400KB

        • memory/1744-60-0x0000000000000000-mapping.dmp

        • memory/1784-80-0x0000000000000000-mapping.dmp

        • memory/1784-83-0x0000000000230000-0x0000000000266000-memory.dmp

          Filesize

          216KB