Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 01:25

General

  • Target

    6d717fe6e6123691c7d9ffee92625c2f.exe

  • Size

    47KB

  • MD5

    6d717fe6e6123691c7d9ffee92625c2f

  • SHA1

    ac8e4b99c2398a48884805255f2fa90daf0dff3c

  • SHA256

    39ae1a73d9326d866c0ea79742243790ed3aeeceac161f1a23f7b0c7b84b4570

  • SHA512

    2b1d1ef8cc59b9916ccea5712609117d99576d59d3376bfe187eca473f988c0c76bc16dfff75d0e936af769963e13135f2f5f45ae7d4b62c619ffb88d20afdf8

  • SSDEEP

    768:R/IO5VILWCyh+DiWtelDSN+iV08YbygejovEgK/J/ZVc6KN:R/PNWtKDs4zb1BnkJ/ZVclN

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

193.233.48.17:8848

Mutex

dfas9asdf8as8z

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

test

C2

193.233.48.17:9832

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d717fe6e6123691c7d9ffee92625c2f.exe
    "C:\Users\Admin\AppData\Local\Temp\6d717fe6e6123691c7d9ffee92625c2f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\build.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\build.exe"'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Users\Admin\AppData\Local\Temp\build.exe
          "C:\Users\Admin\AppData\Local\Temp\build.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    95KB

    MD5

    37ccecb56eb0d2db0a5159b5bbc3ec5b

    SHA1

    7ba3a1ef06bbd6b1444337ff58736aeeec6d4164

    SHA256

    8dfbcef9c1dfe6a9bbc7d3a97ba8ac8928e6b4abc83bbd49e67a33c061a119cc

    SHA512

    8f93b9dce515b51cfb61fbc21881a83d8623a30849195299759edc9c8c2f3898562d5f461bc15b22c1abc7a9b3ab430a9bfdd7d610cf24d842ce28d672c77354

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    95KB

    MD5

    37ccecb56eb0d2db0a5159b5bbc3ec5b

    SHA1

    7ba3a1ef06bbd6b1444337ff58736aeeec6d4164

    SHA256

    8dfbcef9c1dfe6a9bbc7d3a97ba8ac8928e6b4abc83bbd49e67a33c061a119cc

    SHA512

    8f93b9dce515b51cfb61fbc21881a83d8623a30849195299759edc9c8c2f3898562d5f461bc15b22c1abc7a9b3ab430a9bfdd7d610cf24d842ce28d672c77354

  • memory/2280-137-0x0000000000000000-mapping.dmp

  • memory/2480-143-0x00007FFF25800000-0x00007FFF262C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2480-138-0x0000000000000000-mapping.dmp

  • memory/2480-139-0x000001BF7D340000-0x000001BF7D362000-memory.dmp

    Filesize

    136KB

  • memory/4228-148-0x0000000005220000-0x000000000532A000-memory.dmp

    Filesize

    1.0MB

  • memory/4228-147-0x0000000004F70000-0x0000000004FAC000-memory.dmp

    Filesize

    240KB

  • memory/4228-151-0x0000000006490000-0x00000000064F6000-memory.dmp

    Filesize

    408KB

  • memory/4228-141-0x0000000000000000-mapping.dmp

  • memory/4228-145-0x00000000055F0000-0x0000000005C08000-memory.dmp

    Filesize

    6.1MB

  • memory/4228-150-0x0000000006C00000-0x000000000712C000-memory.dmp

    Filesize

    5.2MB

  • memory/4228-149-0x0000000006500000-0x00000000066C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4228-144-0x0000000000590000-0x00000000005AE000-memory.dmp

    Filesize

    120KB

  • memory/4228-146-0x0000000004F10000-0x0000000004F22000-memory.dmp

    Filesize

    72KB

  • memory/4320-133-0x00007FFF25800000-0x00007FFF262C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4320-136-0x0000000002440000-0x000000000245E000-memory.dmp

    Filesize

    120KB

  • memory/4320-135-0x000000001BB30000-0x000000001BBA6000-memory.dmp

    Filesize

    472KB

  • memory/4320-132-0x00000000001F0000-0x0000000000202000-memory.dmp

    Filesize

    72KB

  • memory/4320-134-0x00007FFF25800000-0x00007FFF262C1000-memory.dmp

    Filesize

    10.8MB