Analysis

  • max time kernel
    133s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 00:01

General

  • Target

    6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe

  • Size

    4.5MB

  • MD5

    d48e7bfd3aeb182e89b7e7ce883cd3f2

  • SHA1

    b851e6bbf0c6fa176dac656b7bf45eaaa073e5d8

  • SHA256

    6e587363f78cb91de1b18cfe6a44174eb9426b724bcc757c3f7314a2881d3b39

  • SHA512

    e5fbea3a7a1c85dc60c0953ababceb308bea28a5abb338804fc3c3e521ffe4e9b85eb0d717bd37a3862edbf6aaaa19c1f62a500ad53645a9ca0c57282b0fd1a5

  • SSDEEP

    49152:4DKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/isxJ:E5KLhvN+ooV3ASWQ715xJ

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe
    "C:\Users\Admin\AppData\Local\Temp\6E587363F78CB91DE1B18CFE6A44174EB9426B724BCC7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Roaming\Google Chrome.exe
      "C:\Users\Admin\AppData\Roaming\Google Chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5028
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:60
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2508
          • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe
            "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe" /C schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4956
              • C:\Windows\system32\schtasks.exe
                schtasks /create /tn \GoogleChrome /tr "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                7⤵
                • Creates scheduled task(s)
                PID:3272
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4164
          • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe
            "C:\Users\Admin\AppData\Local\Temp\DevCWO.exe"
            5⤵
            • Executes dropped EXE
            PID:380
    • C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe
      "C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1140
  • C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe
    "C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Google Chrome.exe.log

    Filesize

    1KB

    MD5

    baf55b95da4a601229647f25dad12878

    SHA1

    abc16954ebfd213733c4493fc1910164d825cac8

    SHA256

    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

    SHA512

    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    6cf293cb4d80be23433eecf74ddb5503

    SHA1

    24fe4752df102c2ef492954d6b046cb5512ad408

    SHA256

    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

    SHA512

    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    5caad758326454b5788ec35315c4c304

    SHA1

    3aef8dba8042662a7fcf97e51047dc636b4d4724

    SHA256

    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

    SHA512

    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

  • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

    Filesize

    2.5MB

    MD5

    7bc0a36bc35c40f23951db94ec13568f

    SHA1

    308a8a7b160a890fd8074649575295dd23dac873

    SHA256

    b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

    SHA512

    fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

  • C:\Users\Admin\AppData\Local\Temp\DevCWO.exe

    Filesize

    2.5MB

    MD5

    7bc0a36bc35c40f23951db94ec13568f

    SHA1

    308a8a7b160a890fd8074649575295dd23dac873

    SHA256

    b386c6775e3cff49dc90319b0f658386ddb4fec6034363e483567c8d8b0f5262

    SHA512

    fc9526911ef8695213119f7f904ea2283a8bc3c338abc26f724b385504067373cca55ceecfd54753baab5475fdea91c42daf39ddbd74915fc4f6eb7520ee4e62

  • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

    Filesize

    196KB

    MD5

    8d0042b80d25d0c74a619a3d594c9deb

    SHA1

    c13fe83d6cfbdd37d8e24a908ed65fedd964e723

    SHA256

    955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

    SHA512

    0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

  • C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe

    Filesize

    196KB

    MD5

    8d0042b80d25d0c74a619a3d594c9deb

    SHA1

    c13fe83d6cfbdd37d8e24a908ed65fedd964e723

    SHA256

    955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

    SHA512

    0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

  • C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe

    Filesize

    3.8MB

    MD5

    15578026730e6167e7de93f7b87b2af2

    SHA1

    6c554e922ec846d6338d9e97182c30486b154002

    SHA256

    7335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973

    SHA512

    86452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab

  • C:\Users\Admin\AppData\Local\Temp\SQLi Dorks Generator By The N3RoX[x86].exe

    Filesize

    3.8MB

    MD5

    15578026730e6167e7de93f7b87b2af2

    SHA1

    6c554e922ec846d6338d9e97182c30486b154002

    SHA256

    7335d92aa0d7a2c2233b172e11474aa953c47cb7b8e6bded3dbf91a9d881e973

    SHA512

    86452d1b77997455d4eec36cb70328792252cdd1b906ab2e4b8c17a016841dfc2760b305d3b2a1087e498e00ad8e7658cc7557a85183bb9b75d9f7df8e950dab

  • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

    Filesize

    403KB

    MD5

    f903148b5a0c07db2c61ce05fa5c7db2

    SHA1

    b636a8bf5769f7fe27c263eab54026ac03732ad4

    SHA256

    2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

    SHA512

    3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

  • C:\Users\Admin\AppData\Roaming\Google Chrome.exe

    Filesize

    403KB

    MD5

    f903148b5a0c07db2c61ce05fa5c7db2

    SHA1

    b636a8bf5769f7fe27c263eab54026ac03732ad4

    SHA256

    2999cb6a5b4a9d38c8f85c1b24a6574147c12c90b4a36e5a81c7aa9c7eecfe3d

    SHA512

    3abb409a61e167f60af116cd2191435bdc7876ce5483905bd944a01dec2c41e5736ae4ffeb628ea74eeef205e7b5e0c0e04520b58e14aa3240bf9a2de0dfd9b9

  • C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe

    Filesize

    196KB

    MD5

    8d0042b80d25d0c74a619a3d594c9deb

    SHA1

    c13fe83d6cfbdd37d8e24a908ed65fedd964e723

    SHA256

    955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

    SHA512

    0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

  • C:\Users\Admin\AppData\Roaming\Google Chrome\Google Chrome.exe

    Filesize

    196KB

    MD5

    8d0042b80d25d0c74a619a3d594c9deb

    SHA1

    c13fe83d6cfbdd37d8e24a908ed65fedd964e723

    SHA256

    955025ec2a4a635f597080fac9287b2692b69536b16f7c736a041a163011cb85

    SHA512

    0571e96d5615a75f8b2fce43488074e4ed84b69180d087f361542a08d49065a08b995996b578ad926c589035eccbd57a0431eb2ff5f12e472e97889774fb94c0

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    275KB

    MD5

    32a56b4e67436bdd3d39809a9be949b8

    SHA1

    dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

    SHA256

    5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

    SHA512

    70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    275KB

    MD5

    32a56b4e67436bdd3d39809a9be949b8

    SHA1

    dac60ca2763d18ce9451b28f4d0a1d9fbdc3f4fc

    SHA256

    5f6475a6d18503fbc2eb916e32ed1d6b4769f58d364ef2f94c2fd1a52c9aa1df

    SHA512

    70b8dc7b1509cfa3975c97baa4a2b49746fac2438307ab97ae67bdd0e98d2d26e05f2e83c0349234b4deb9314715aea01084fd11e7f77b2d4bba856aa7726e47

  • memory/60-153-0x0000000000000000-mapping.dmp

  • memory/380-176-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/380-174-0x0000000000CC0000-0x0000000000F42000-memory.dmp

    Filesize

    2.5MB

  • memory/380-172-0x0000000000000000-mapping.dmp

  • memory/380-181-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/1064-166-0x0000000000000000-mapping.dmp

  • memory/1140-141-0x0000000000000000-mapping.dmp

  • memory/2436-180-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/2436-182-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/2508-155-0x00000252C2920000-0x00000252C2942000-memory.dmp

    Filesize

    136KB

  • memory/2508-157-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/2508-162-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/2508-154-0x0000000000000000-mapping.dmp

  • memory/2764-158-0x0000000000000000-mapping.dmp

  • memory/2764-160-0x0000000000380000-0x00000000003B6000-memory.dmp

    Filesize

    216KB

  • memory/2764-163-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/3272-164-0x0000000000000000-mapping.dmp

  • memory/3908-151-0x000000001F2E0000-0x000000001F356000-memory.dmp

    Filesize

    472KB

  • memory/3908-137-0x0000000000000000-mapping.dmp

  • memory/3908-152-0x000000001C5E0000-0x000000001C5FE000-memory.dmp

    Filesize

    120KB

  • memory/3908-140-0x00000000007E0000-0x000000000082A000-memory.dmp

    Filesize

    296KB

  • memory/3908-150-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/3908-145-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/4164-175-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/4164-167-0x0000000000000000-mapping.dmp

  • memory/4164-171-0x00007FFA318B0000-0x00007FFA32371000-memory.dmp

    Filesize

    10.8MB

  • memory/4472-132-0x00000000752D0000-0x0000000075881000-memory.dmp

    Filesize

    5.7MB

  • memory/4472-144-0x00000000752D0000-0x0000000075881000-memory.dmp

    Filesize

    5.7MB

  • memory/4472-133-0x00000000752D0000-0x0000000075881000-memory.dmp

    Filesize

    5.7MB

  • memory/4956-161-0x0000000000000000-mapping.dmp

  • memory/5028-147-0x0000000005D30000-0x0000000006348000-memory.dmp

    Filesize

    6.1MB

  • memory/5028-148-0x0000000005730000-0x0000000005742000-memory.dmp

    Filesize

    72KB

  • memory/5028-146-0x0000000000D60000-0x0000000000DCA000-memory.dmp

    Filesize

    424KB

  • memory/5028-149-0x0000000005790000-0x00000000057CC000-memory.dmp

    Filesize

    240KB

  • memory/5028-165-0x0000000005A40000-0x0000000005B4A000-memory.dmp

    Filesize

    1.0MB

  • memory/5028-134-0x0000000000000000-mapping.dmp