Analysis

  • max time kernel
    133s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:01

General

  • Target

    6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe

  • Size

    4.5MB

  • MD5

    d48e7bfd3aeb182e89b7e7ce883cd3f2

  • SHA1

    b851e6bbf0c6fa176dac656b7bf45eaaa073e5d8

  • SHA256

    6e587363f78cb91de1b18cfe6a44174eb9426b724bcc757c3f7314a2881d3b39

  • SHA512

    e5fbea3a7a1c85dc60c0953ababceb308bea28a5abb338804fc3c3e521ffe4e9b85eb0d717bd37a3862edbf6aaaa19c1f62a500ad53645a9ca0c57282b0fd1a5

  • SSDEEP

    49152:4DKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/isxJ:E5KLhvN+ooV3ASWQ715xJ

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Async RAT payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe
    "C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Roaming\Google Chrome.exe
      "C:\Users\Admin\AppData\Roaming\Google Chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1032
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
            "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1396
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /C schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              6⤵
                PID:2044
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                  7⤵
                  • Creates scheduled task(s)
                  PID:1476
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2008
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe
              "C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"
              5⤵
              • Executes dropped EXE
              PID:988
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1144
            • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe
              "C:\Users\Admin\AppData\Local\Temp\DevRVO.exe"
              5⤵
              • Executes dropped EXE
              PID:1536
      • C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe
        "C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:320
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {FB6A2A7A-C8BA-4C69-BFDD-F35481F5B3E9} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
      1⤵
        PID:1212

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

        Filesize

        2.5MB

        MD5

        7bc0a36bc35c40f23951db94ec13568f

        SHA1

        308a8a7b160a890fd8074649575295dd23dac873

        SHA256

        b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

        SHA512

        fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

      • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

        Filesize

        2.5MB

        MD5

        7bc0a36bc35c40f23951db94ec13568f

        SHA1

        308a8a7b160a890fd8074649575295dd23dac873

        SHA256

        b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

        SHA512

        fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

      • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe

        Filesize

        31.1MB

        MD5

        a4d0ed1802d4eb6faf8a6487dd0c8d56

        SHA1

        aa038c155f3a49f1c7b2771621fce21b3810b806

        SHA256

        0f7b8e83f98efd81ab4d5a7d4f98db3d44fab4ee2bf12a8f14a55b679117ba4c

        SHA512

        feadf1a98eb692a337cf46695d464b789af9684265d6ea08fef43234fbed0f18fc604f9264096ab15766aa0639b8b8fba9572ce91eca55f62b13271b48fed3d8

      • C:\Users\Admin\AppData\Local\Temp\DevRVO.exe

        Filesize

        31.1MB

        MD5

        a4d0ed1802d4eb6faf8a6487dd0c8d56

        SHA1

        aa038c155f3a49f1c7b2771621fce21b3810b806

        SHA256

        0f7b8e83f98efd81ab4d5a7d4f98db3d44fab4ee2bf12a8f14a55b679117ba4c

        SHA512

        feadf1a98eb692a337cf46695d464b789af9684265d6ea08fef43234fbed0f18fc604f9264096ab15766aa0639b8b8fba9572ce91eca55f62b13271b48fed3d8

      • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

        Filesize

        196KB

        MD5

        8d0042b80d25d0c74a619a3d594c9deb

        SHA1

        c13fe83d6cfbdd37d8e24a908ed65fedd964e723

        SHA256

        955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

        SHA512

        0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

      • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

        Filesize

        196KB

        MD5

        8d0042b80d25d0c74a619a3d594c9deb

        SHA1

        c13fe83d6cfbdd37d8e24a908ed65fedd964e723

        SHA256

        955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

        SHA512

        0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

      • C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe

        Filesize

        3.8MB

        MD5

        15578026730e6167e7de93f7b87b2af2

        SHA1

        6c554e922ec846d6338d9e97182c30486b154002

        SHA256

        7335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973

        SHA512

        86452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab

      • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

        Filesize

        403KB

        MD5

        f903148b5a0c07db2c61ce05fa5c7db2

        SHA1

        b636a8bf5769f7fe27c263eab54026ac03732ad4

        SHA256

        2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

        SHA512

        3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

      • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

        Filesize

        403KB

        MD5

        f903148b5a0c07db2c61ce05fa5c7db2

        SHA1

        b636a8bf5769f7fe27c263eab54026ac03732ad4

        SHA256

        2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

        SHA512

        3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        27d2d14ae74e26e5394907ad3ee9cd5e

        SHA1

        47a8152fed3fc43ad5f069dfaaf408b8a57ecc53

        SHA256

        884a2ee87e5354504ee8387335412116631590e553b5ed8ee917917e5f1106fd

        SHA512

        ddd4a21ae82e62975e10ac4fb008eda0de5b32383f9c318ec7a05c338586fd59901bc848fae01428db90b4172f6643a6174a503e7e08b49c686202f28eda338f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        27d2d14ae74e26e5394907ad3ee9cd5e

        SHA1

        47a8152fed3fc43ad5f069dfaaf408b8a57ecc53

        SHA256

        884a2ee87e5354504ee8387335412116631590e553b5ed8ee917917e5f1106fd

        SHA512

        ddd4a21ae82e62975e10ac4fb008eda0de5b32383f9c318ec7a05c338586fd59901bc848fae01428db90b4172f6643a6174a503e7e08b49c686202f28eda338f

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        275KB

        MD5

        32a56b4e67436bdd3d39809a9be949b8

        SHA1

        dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

        SHA256

        5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

        SHA512

        70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        275KB

        MD5

        32a56b4e67436bdd3d39809a9be949b8

        SHA1

        dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

        SHA256

        5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

        SHA512

        70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

      • \Users\Admin\AppData\Local\Temp\DevCWO.exe

        Filesize

        2.5MB

        MD5

        7bc0a36bc35c40f23951db94ec13568f

        SHA1

        308a8a7b160a890fd8074649575295dd23dac873

        SHA256

        b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

        SHA512

        fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

      • \Users\Admin\AppData\Local\Temp\DevRVO.exe

        Filesize

        31.1MB

        MD5

        a4d0ed1802d4eb6faf8a6487dd0c8d56

        SHA1

        aa038c155f3a49f1c7b2771621fce21b3810b806

        SHA256

        0f7b8e83f98efd81ab4d5a7d4f98db3d44fab4ee2bf12a8f14a55b679117ba4c

        SHA512

        feadf1a98eb692a337cf46695d464b789af9684265d6ea08fef43234fbed0f18fc604f9264096ab15766aa0639b8b8fba9572ce91eca55f62b13271b48fed3d8

      • \Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe

        Filesize

        3.8MB

        MD5

        15578026730e6167e7de93f7b87b2af2

        SHA1

        6c554e922ec846d6338d9e97182c30486b154002

        SHA256

        7335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973

        SHA512

        86452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab

      • \Users\Admin\AppData\Roaming\Google Chrome.exe

        Filesize

        403KB

        MD5

        f903148b5a0c07db2c61ce05fa5c7db2

        SHA1

        b636a8bf5769f7fe27c263eab54026ac03732ad4

        SHA256

        2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

        SHA512

        3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        275KB

        MD5

        32a56b4e67436bdd3d39809a9be949b8

        SHA1

        dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

        SHA256

        5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

        SHA512

        70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

      • memory/320-64-0x0000000000000000-mapping.dmp

      • memory/640-102-0x0000000000000000-mapping.dmp

      • memory/676-69-0x00000000011F0000-0x000000000123A000-memory.dmp

        Filesize

        296KB

      • memory/676-117-0x0000000001160000-0x00000000011C4000-memory.dmp

        Filesize

        400KB

      • memory/676-71-0x00000000004E0000-0x00000000004EC000-memory.dmp

        Filesize

        48KB

      • memory/676-59-0x0000000000000000-mapping.dmp

      • memory/900-54-0x00000000760E1000-0x00000000760E3000-memory.dmp

        Filesize

        8KB

      • memory/900-67-0x0000000074720000-0x0000000074CCB000-memory.dmp

        Filesize

        5.7MB

      • memory/988-99-0x0000000000BC0000-0x0000000000E42000-memory.dmp

        Filesize

        2.5MB

      • memory/988-96-0x0000000000000000-mapping.dmp

      • memory/1032-68-0x0000000000820000-0x000000000088A000-memory.dmp

        Filesize

        424KB

      • memory/1032-56-0x0000000000000000-mapping.dmp

      • memory/1144-103-0x0000000000000000-mapping.dmp

      • memory/1144-111-0x000000000257B000-0x000000000259A000-memory.dmp

        Filesize

        124KB

      • memory/1144-107-0x000007FEEB430000-0x000007FEEBF8D000-memory.dmp

        Filesize

        11.4MB

      • memory/1144-108-0x000000001B770000-0x000000001BA6F000-memory.dmp

        Filesize

        3.0MB

      • memory/1144-106-0x000007FEEBF90000-0x000007FEEC9B3000-memory.dmp

        Filesize

        10.1MB

      • memory/1144-109-0x0000000002574000-0x0000000002577000-memory.dmp

        Filesize

        12KB

      • memory/1144-115-0x000000000257B000-0x000000000259A000-memory.dmp

        Filesize

        124KB

      • memory/1396-85-0x0000000000AA0000-0x0000000000AD6000-memory.dmp

        Filesize

        216KB

      • memory/1396-81-0x0000000000000000-mapping.dmp

      • memory/1536-116-0x00000000000A0000-0x0000000001FB8000-memory.dmp

        Filesize

        31.1MB

      • memory/1536-113-0x0000000000000000-mapping.dmp

      • memory/1712-92-0x000007FEEAA90000-0x000007FEEB5ED000-memory.dmp

        Filesize

        11.4MB

      • memory/1712-100-0x0000000002874000-0x0000000002877000-memory.dmp

        Filesize

        12KB

      • memory/1712-98-0x000000000287B000-0x000000000289A000-memory.dmp

        Filesize

        124KB

      • memory/1712-101-0x000000000287B000-0x000000000289A000-memory.dmp

        Filesize

        124KB

      • memory/1712-93-0x0000000002874000-0x0000000002877000-memory.dmp

        Filesize

        12KB

      • memory/1712-91-0x000007FEEB5F0000-0x000007FEEC013000-memory.dmp

        Filesize

        10.1MB

      • memory/1712-88-0x0000000000000000-mapping.dmp

      • memory/1740-84-0x00000000027BB000-0x00000000027DA000-memory.dmp

        Filesize

        124KB

      • memory/1740-77-0x00000000027B4000-0x00000000027B7000-memory.dmp

        Filesize

        12KB

      • memory/1740-76-0x000007FEEB430000-0x000007FEEBF8D000-memory.dmp

        Filesize

        11.4MB

      • memory/1740-78-0x000000001B700000-0x000000001B9FF000-memory.dmp

        Filesize

        3.0MB

      • memory/1740-79-0x00000000027BB000-0x00000000027DA000-memory.dmp

        Filesize

        124KB

      • memory/1740-75-0x000007FEEBF90000-0x000007FEEC9B3000-memory.dmp

        Filesize

        10.1MB

      • memory/1740-83-0x00000000027B4000-0x00000000027B7000-memory.dmp

        Filesize

        12KB

      • memory/1740-74-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp

        Filesize

        8KB

      • memory/1740-73-0x0000000000000000-mapping.dmp

      • memory/1932-72-0x0000000000000000-mapping.dmp

      • memory/2008-87-0x0000000000000000-mapping.dmp

      • memory/2044-86-0x0000000000000000-mapping.dmp